last executing test programs: 6.002804541s ago: executing program 0 (id=44164): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000500)='ext4_writepages_result\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x12) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000080)={'sit0\x00', @random="4f44db1ac0c9"}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) close(r5) close(r4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x20, 0x7, 0x3, 0x8, 0x0, 0x401, 0x81000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0xf90}, 0x4030, 0x6e61, 0x8000000, 0x5, 0x3, 0x9, 0x20, 0x0, 0x0, 0x0, 0x5}, r2, 0xa, r6, 0x9) 5.928455524s ago: executing program 0 (id=44165): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r0, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) openat$cgroup_ro(r3, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) syz_clone(0x52000400, 0x0, 0x0, 0x0, 0x0, 0x0) 5.110578025s ago: executing program 0 (id=44181): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b4000000000000006111140000000000c700000048000000950000000000000054e45c95a343f18f5040dc434849e7cb8dc97ff1fd220d158daf1b235e337e79cf8c3eb3935318d2ee1d706c0bcdedba1d4405fa3e169ad8276044b5d7450ca0103d7ef5c8b90db38d6581fb338dd20328b8ad4141a37574c474397710f6ca2b4c73423ab1c81d2bbccc8c647939d7d7c19b0c768de34d"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f0000000680)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x40, 0x0, 0x1, 0x9}, 0x20) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x8000, 0x0, r0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000001ac0)=ANY=[@ANYBLOB="180000000000000000000000000000001811000098126524369cd3b0d419db0c7132fcdb42e4a3b27472464f89628115402d3648787888fbbd69d31bd4f7d74ba2759ee1c97e2638c0f95303856e6f7ed853053e367ddcf06bc6cbc68760f8342d0b608b8f4cd070823891ad644843d45a9a5c7d171cab4b2a25957d1bb6e5c23d8420f342ae7c4581550ebdb5993740d9aca72e68b6967fec2e28f1a18de59b3ab02af20097eea07dedc17d38b32d792317e2e5e9122e0f9124b8686e3454fd2c7fdf8d8d9edd6e75798412d2bd82182fe1b97c8100cc570000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095d9fa3d0765b3be834dc0370c8382be2a5a9a9ccc034b601e92605d41e1c8b62c0a33b7ae8acba772404f1c4a7c7500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x18, 0x0, 0x0, 0x0, 0x4}, 0x8c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000580)=ANY=[], 0xfdef) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001d40)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={&(0x7f0000000000)="1c44f8398d21174e0a1f2ebe8a2060f354a94f55b1f2dc4e8f6359c67703dd87d95f4520ca70eb67b56b1dbbb725252cb9a88f447203b28e45448032ee6b1938395ee8120b411f43dacf86", &(0x7f0000000340)=""/167, &(0x7f0000000400)="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", &(0x7f0000000580)="1d46a578c114efa6c4188ea46d58f1f506e801d4a0253c4b8433cd0e7ad454f42f57a927c06b01000000000000000341dc6f0743fa0ad80853016d6bf19a955895c2185e951acdbd313e62d88ab5851b5d6f1e63e76c86fb7b49a0966e042ef6cdb52528868e18bbe8c9fb2d8a7fe1ea27c91e0704ae4e21600000fabdef8569dbc790453c1b7ff19c5104a42c0d7b902232dc8f75dffb95c34e17ca158816e51cefa4ae71cffdda25a5ea712c9a589b29fd3a6d10c332a256f790b83c3ec9d00d357633f491992c33cdd7bcb78c40e6305a0e7191605108111e2552f22848", 0x7ff, r8}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_request_inode\x00', r9}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x4010, r9}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xfffffffd, 0x3f, 0x8, 0x20, r2, 0x7ff, '\x00', 0x0, r1, 0x4, 0x2, 0x4, 0xb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="00000000000000000000294145d8cff889c4b43b8950eb00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001980)=@o_path={&(0x7f0000001940)='./file0\x00', 0x0, 0x4010, r9}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000019c0)={&(0x7f0000000780)="02747b5ad80ee956729292feced369ba7ff2ab54fa6d896dd4e5a2447842e42dbd56bad91ddeabc223eab1f866deecc045228f6bb140fe1cb0ed1526baa6f130da8a522bf6cc15e61ee1d21e2101b9b63c85656a4ce1383016f01678763d153302eafa19e21f91d38306b526bbb18700342a04817e6e152c34801830b3094e11e74a72b5490eabbc5bf54fc3ced7f46e3a8cae7c9088167308d3958091d5f19d5bf5acf6a4f647de9cff0e8b1e6b4414c0d1b20b2170e008725838873883f6965991db012478aaa11b3a1a8dac1fa7c1d88c58c8072cdd283e9413737c682bc310449602ac", &(0x7f0000000080)=""/42, &(0x7f0000000880)="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", &(0x7f0000001880)="4af349d5c6bc0c0a65eed06f724a6b1ad7eb1bba8697f886e09c800722f3b5d0a4fff55ced1c49bd5a7b7e14b9cb67776f17d2a078b7faa87f13461842871031f77a9a8f710aab56f80db83672add482df71b3e315a6fa698611dd9408d73fe533bec54e311e2236f5a25f5ab0549d31edda5606d626c37832ad70d1fcad3d101247321ef5fe18a3a986998c24a08719d0cd2f812db39f0348001d05068eebada9054c9bc60d89ff3a04ba0a0524482a2f82fc4a03145d5ad55a7a", 0x9, r11, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 5.077418916s ago: executing program 3 (id=44183): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r4, &(0x7f0000000200), 0x42400) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x395c, 0x0, r0, 0x8000, '\x00', 0x0, r4, 0x5, 0x4, 0x5}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)='%pK \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x2b, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@call={0x85, 0x0, 0x0, 0x27}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffff0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffb}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0xa, 0x1000, &(0x7f0000000b40)=""/4096, 0x41100, 0x44, '\x00', r7, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x4, 0x7, 0x8, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[r5, 0xffffffffffffffff, r0, r8, r5, r4, r0, r5], 0x0, 0x10, 0x8}, 0x90) 5.022193768s ago: executing program 0 (id=44184): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_ext_rm_idx\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_ext_rm_idx\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r5}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r7}, 0x10) write$cgroup_int(r11, &(0x7f00000000c0), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) 4.956042081s ago: executing program 3 (id=44186): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d0f65acc0d06d1a1434e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c690220b87b20581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f29e5dad9796edb697a8ad004eea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc518afc9ffc2cc788bee1b47683db01a2f9398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db00002e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d50200a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afd80e17000000000000000000000000000000000000000000000000000005205000000dc1c56d19f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db08407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4092140faed0c329be610c3082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d6fccbecfae5553d9950d48c774eaa35b24fce69a20d8bc410d9f48bf7eac90529cd6af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85e9bb70a3009a5d30f479e293a3302e11350ea857b37e76ca2f50378e4092ce2c574ad278b9b7b717c571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c545e25f1cd62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f981179186e4000000000000646174b55d251f7f8ca5ccc22a5efb33b237eff5597a3c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511726f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4445eef08401cd1a3e266db41474e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24c5efd5c8495c1ccd580033c55725f2d60354f8ad5914a0155eaa743350ddb388f486b6de0549ef3b1b3c3b7d4d3a830ff39885776119408029be3788dd8422b1ab7b4c9d5b7d8682fd759c713108e1bdfc64b9121bbf07099def5c0ce3c861ae4b5cad8bba5a0b6059b9ef90c2f96a59320309e25df89484522bb1d6eaa92164f9e4042cb689a45a898354c17b08705205a9189772bcbcb6414e44b33a2470d3bc16f761c33f565b9da5e7991ad8482579cc1b16c1fcec815a5482ae8b1779c5e339971a6ec1217bcfd1ef24284de8a0a9f068f297037d6478c2434a9a18dcc6c7c791e444a79d7ce37f9cf2a434b9048ca6a2fa254aa02cd098026798a6d336348af0fc11fa2809a5ebbe17ca4d6356e4450d043ed20d313cd56a56d2e4cdf26f19af9a41695a58a9b6b45af1ca939b18d7b57791b99cfc6ec2a0848c29fea4eb8b82395a38e8aca5ab4bfc2ad8acf2e51b766f8ecd16194ad41ec097082f7fa32179ef99dafa6c2aa206a25ddc33e6f0a09169eeff428c71f54e1dfcfcd7cfc8f6e169f11c47d504"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000140)="b9ff03076804268cb89e14f088a847e0ffff2000000000000000ac141416e0885a049a179424", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 4.941572472s ago: executing program 3 (id=44189): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x300, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='ext4_es_remove_extent\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='ext4_es_remove_extent\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x800, 0x0, 0xffffffffffffffff, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x6, 0x2}, 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x0, 0x9, 0x2, 0xa, 0x100, 0x1}], &(0x7f0000000540)='GPL\x00', 0xe0, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x4, 0xf, 0x0, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[r6, r6, r6, r6, r6, r6], &(0x7f0000000600)=[{0x1, 0x3, 0xa, 0xa}, {0x4, 0x2, 0x7, 0xa}, {0x5, 0x1, 0x7, 0x1}, {0x2, 0x2, 0xa, 0x4}], 0x10, 0x401}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000240)={0x8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1, 0xc, &(0x7f00000009c0)=ANY=[], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, r7, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000180)=@raw=[@generic={0x4, 0x5, 0x1, 0xc56, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ldst={0x3, 0x2, 0x3, 0x0, 0xa, 0x4, 0x1}], &(0x7f00000001c0)='syzkaller\x00', 0x10000, 0xbd, &(0x7f0000000280)=""/189, 0x0, 0x10, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0xb, 0x5, 0x8000}, 0x10, r8, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000740)=[{0x1, 0x5, 0x8, 0xc}, {0x1, 0x5, 0x7, 0x6}, {0x2, 0x2, 0xe}, {0x1, 0x5, 0xf, 0x1}], 0x10, 0x6}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000040)=r9, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000500)='ext4_journal_start\x00', r9}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r11}, 0x10) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) 4.868029584s ago: executing program 2 (id=44190): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000005400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_ext_rm_idx\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_ext_rm_idx\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 4.496351218s ago: executing program 2 (id=44193): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000340)='module_request\x00', r0}, 0x10) socketpair(0x0, 0x2, 0x0, &(0x7f0000000000)) 4.495306838s ago: executing program 3 (id=44194): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = gettid() perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x5, 0xb6, 0x20, 0x3, 0x0, 0x8, 0xc129, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x9, 0xfa}, 0x2162, 0x842, 0x2, 0x9, 0x8, 0x4, 0x2, 0x0, 0x200, 0x0, 0x9}, r5, 0x0, r2, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0}, 0x90) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9c79077fa15ba36eca61299de54cf77c9062430bc068829afff36b31fa7e35ce95d04"], &(0x7f0000281ffc)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0x36, 0x0, &(0x7f0000000240)="5cdd3086ddff0066b3c9bbac88a8866c00dffd0013dd00000000000000008100f5df86dd46df15f10f5cde90672614c5f512118cdb86", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r6, &(0x7f0000000240)=ANY=[], 0xffbf) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x40002200, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.010920447s ago: executing program 2 (id=44197): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f00000003c0)=0x1f) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x6a, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x76}}, &(0x7f0000000480)='GPL\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x22}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00'}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x65}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='jbd2_write_superblock\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.1GB.usage_in_bytes\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) 4.006683047s ago: executing program 3 (id=44198): r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000040), 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x0, 0x0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x11, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5ea, 0x0, 0x0, 0x0, 0x80}, {}, {}, [@call={0x85, 0x0, 0x0, 0x2b}, @ldst={0x3, 0x3, 0x0, 0x0, 0x1, 0x80000000000000b3, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x1e, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000400)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x2, 0x4, 0x9, 0xc}, {0x1, 0x3, 0x7, 0x7}, {0x2, 0x2, 0x10, 0x2}, {0x0, 0x3, 0x2, 0x7}, {0x0, 0x5, 0x6, 0x2}], 0x10, 0x7}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x2010, 0x1, 0xdd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xf}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)='%-010d \x00'}, 0x20) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x58, 0x0, 0x1, 0x53, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x18, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x1}, [@cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f00000000c0)='GPL\x00', 0xffffffff, 0x68, &(0x7f0000000100)=""/104, 0x40f00, 0x8, '\x00', r1, 0x17, r0, 0x8, &(0x7f0000000240)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x2, 0x4, 0x400}, 0x10, r2, r3, 0x1, &(0x7f0000000800)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000840)=[{0x3, 0x5, 0xe, 0xc}]}, 0x90) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000940)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r9, &(0x7f0000000980)='syz0\x00', 0x1ff) openat$ppp(0xffffffffffffff9c, &(0x7f00000009c0), 0x210001, 0x0) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000a00), 0x8) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a40)) write$cgroup_int(r10, &(0x7f0000000a80)=0xffffffffffffffff, 0x12) r11 = openat$cgroup_ro(r10, &(0x7f0000000ac0)='blkio.throttle.io_serviced\x00', 0x0, 0x0) write$cgroup_subtree(r10, &(0x7f0000000b00)={[{0x2b, 'io'}, {0x2b, 'io'}, {0x2b, 'perf_event'}, {0x2d, 'freezer'}, {0x6, 'pids'}, {0x2d, 'net_prio'}]}, 0x2d) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000dc0)={&(0x7f0000000b40)="e41cc67d87e0d6be78886eec1a9ef0601be99514e5cc107acd3b5d34df9038004fb9271a7a77e04ffa29cb3a14835a4aac294fd3147b9754490064d3dad8eefddb30800824ae83817e2bcd128c35733806da9490155cbda66093d5beed40a07f7b9be77d50707ce1d17873909ca3ed67489b46ba78a6775a1e24192dc4c6142f83bbb0de8534595afa6ec5fbe17774650eca890f21f3e3c6934a50b4bc8587801fe95e7c60e33389e1c65f99cbf1d1edd75258919af578b54d47df5b6adbc3dc4540c5d92060ed489d26c8b594db9ce544e891af0203d03413e479", &(0x7f0000000c40)=""/132, &(0x7f0000000d00)="7100f3197973b923e6d0887799cd739fa1e5bfc1dfdd433a5a0ebec050b694872a0530f3fcb57d", &(0x7f0000000d40)="1c106669af8f2c92e3d9f527686a6c6e81c369fec6ae7cf7c0ff7bc14f05df80b8133053cce1cbeb48119b176a33697ed9bbb1611f401dacfcdd2c3ee51aaa16c50ae6d7278bce17e250c78389362dc51f1e7c0ae35cd22a78bcffc4372e04fe1720380a03ce2e1c4bd92e0bc96834f8", 0x4, r4}, 0x38) socketpair(0x29, 0x1ce3ecf334feb85c, 0xffffffff, &(0x7f0000000e00)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001140)={r11, 0x0, 0xcf, 0x6f, &(0x7f0000000e80)="22199bc3cd8463fec5908caa84ece5931b43f2dc34dfcaf8ea7c61f106ef1d4f45275eb2a898adc5b4f04c07a689402effbe66e458a7f71536ae47736a6a7adb61f61ff14d1534580796d53bf2db9a25ef437bcaf46dd0e4c4731845a14e5e0060dcb58fa8e0aa9fd9d47ecd555a6f44932390becafe6e4832c16d35cd8cdae85b10208d947f87de6635f355cd3ca4b37409b044afde96770221ae54cacf863aa8c6ced941c1bc43514b9fc32786fb11a519dfbe0fdc26cdf2e60f44cd7a91728b38dea758395abdf54996c3ba7e06", &(0x7f0000000f80)=""/111, 0x5, 0x0, 0xfb, 0x1b, &(0x7f0000001000)="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", &(0x7f0000001100)="25a83d5a31da24b16f710d2bbeb6b29c3310f79b5f2554a27c5c2a", 0x2, 0x0, 0x3}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000011c0)={r10, 0xffffffffffffffff}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000012c0)={r12, &(0x7f0000001200)="e8502df752b4d6b4b513ebc7a9ebe1b61db1583bbb67dfe81496a35ff89c68a20a2eeef58788b106de76036ec04d299450b2a1baf8bef29e50bda704f69cf79d584a219cd9ebc36d5bd6bf90952639b3183c43b5b7983b4424f727e13658c99d8d0b8e9a67503931ac28c81929d953d8847d917d0bdeb86d1223b88bbdc0355c8e91984650236212b8d8d5d5cf8f6026be9a61e9aecc3666413dfdbe6ecb272a359578b6f96849abeb60537f15ee902bbd53017aef"}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={r11, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf3, &(0x7f0000001400)=[{}], 0x8, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x5e, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) ioctl$TUNSETIFINDEX(r10, 0x400454da, &(0x7f0000001640)=r13) bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x1d, 0x6, 0x1, 0x101, 0xa00, r4, 0x6, '\x00', r1, r11, 0x1, 0x3}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001700)={0x1b, 0x0, 0x0, 0x3, 0x0, r12, 0x1, '\x00', r1, r11, 0x5, 0x3, 0x2}, 0x48) 3.445485829s ago: executing program 2 (id=44201): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8902, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x0, 0xb3, 0x7f}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b40500000000000071101f000000000066000000000000009500000000000000cd472c9289072938bc9c6ce79c31657525a15f7c566ab0a0879eac7decc602dc52dda9498c8eabecd25822e4b41d41c5c371af14a1dfb04bd306186702e92c0c24a19dab7f05d8e170b4f5515c01b2ef2842db7582cfb4f58105e41ba6034437ab4aedc300"/162], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x10}, 0x90) socketpair$unix(0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 3.443470459s ago: executing program 3 (id=44198): r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000040), 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x0, 0x0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x11, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5ea, 0x0, 0x0, 0x0, 0x80}, {}, {}, [@call={0x85, 0x0, 0x0, 0x2b}, @ldst={0x3, 0x3, 0x0, 0x0, 0x1, 0x80000000000000b3, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x1e, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000400)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x2, 0x4, 0x9, 0xc}, {0x1, 0x3, 0x7, 0x7}, {0x2, 0x2, 0x10, 0x2}, {0x0, 0x3, 0x2, 0x7}, {0x0, 0x5, 0x6, 0x2}], 0x10, 0x7}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x2010, 0x1, 0xdd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xf}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)='%-010d \x00'}, 0x20) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x58, 0x0, 0x1, 0x53, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x18, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x1}, [@cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f00000000c0)='GPL\x00', 0xffffffff, 0x68, &(0x7f0000000100)=""/104, 0x40f00, 0x8, '\x00', r1, 0x17, r0, 0x8, &(0x7f0000000240)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x2, 0x4, 0x400}, 0x10, r2, r3, 0x1, &(0x7f0000000800)=[r4, r5, r6, r7, 0x1, r8], &(0x7f0000000840)=[{0x3, 0x5, 0xe, 0xc}]}, 0x90) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000940)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r9, &(0x7f0000000980)='syz0\x00', 0x1ff) openat$ppp(0xffffffffffffff9c, &(0x7f00000009c0), 0x210001, 0x0) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000a00), 0x8) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a40)) write$cgroup_int(r10, &(0x7f0000000a80)=0xffffffffffffffff, 0x12) r11 = openat$cgroup_ro(r10, &(0x7f0000000ac0)='blkio.throttle.io_serviced\x00', 0x0, 0x0) write$cgroup_subtree(r10, &(0x7f0000000b00)={[{0x2b, 'io'}, {0x2b, 'io'}, {0x2b, 'perf_event'}, {0x2d, 'freezer'}, {0x6, 'pids'}, {0x2d, 'net_prio'}]}, 0x2d) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000dc0)={&(0x7f0000000b40)="e41cc67d87e0d6be78886eec1a9ef0601be99514e5cc107acd3b5d34df9038004fb9271a7a77e04ffa29cb3a14835a4aac294fd3147b9754490064d3dad8eefddb30800824ae83817e2bcd128c35733806da9490155cbda66093d5beed40a07f7b9be77d50707ce1d17873909ca3ed67489b46ba78a6775a1e24192dc4c6142f83bbb0de8534595afa6ec5fbe17774650eca890f21f3e3c6934a50b4bc8587801fe95e7c60e33389e1c65f99cbf1d1edd75258919af578b54d47df5b6adbc3dc4540c5d92060ed489d26c8b594db9ce544e891af0203d03413e479", &(0x7f0000000c40)=""/132, &(0x7f0000000d00)="7100f3197973b923e6d0887799cd739fa1e5bfc1dfdd433a5a0ebec050b694872a0530f3fcb57d", &(0x7f0000000d40)="1c106669af8f2c92e3d9f527686a6c6e81c369fec6ae7cf7c0ff7bc14f05df80b8133053cce1cbeb48119b176a33697ed9bbb1611f401dacfcdd2c3ee51aaa16c50ae6d7278bce17e250c78389362dc51f1e7c0ae35cd22a78bcffc4372e04fe1720380a03ce2e1c4bd92e0bc96834f8", 0x4, r4}, 0x38) socketpair(0x29, 0x1ce3ecf334feb85c, 0xffffffff, &(0x7f0000000e00)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001140)={r11, 0x0, 0xcf, 0x6f, &(0x7f0000000e80)="22199bc3cd8463fec5908caa84ece5931b43f2dc34dfcaf8ea7c61f106ef1d4f45275eb2a898adc5b4f04c07a689402effbe66e458a7f71536ae47736a6a7adb61f61ff14d1534580796d53bf2db9a25ef437bcaf46dd0e4c4731845a14e5e0060dcb58fa8e0aa9fd9d47ecd555a6f44932390becafe6e4832c16d35cd8cdae85b10208d947f87de6635f355cd3ca4b37409b044afde96770221ae54cacf863aa8c6ced941c1bc43514b9fc32786fb11a519dfbe0fdc26cdf2e60f44cd7a91728b38dea758395abdf54996c3ba7e06", &(0x7f0000000f80)=""/111, 0x5, 0x0, 0xfb, 0x1b, &(0x7f0000001000)="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", &(0x7f0000001100)="25a83d5a31da24b16f710d2bbeb6b29c3310f79b5f2554a27c5c2a", 0x2, 0x0, 0x3}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000011c0)={r10, 0xffffffffffffffff}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000012c0)={r12, &(0x7f0000001200)="e8502df752b4d6b4b513ebc7a9ebe1b61db1583bbb67dfe81496a35ff89c68a20a2eeef58788b106de76036ec04d299450b2a1baf8bef29e50bda704f69cf79d584a219cd9ebc36d5bd6bf90952639b3183c43b5b7983b4424f727e13658c99d8d0b8e9a67503931ac28c81929d953d8847d917d0bdeb86d1223b88bbdc0355c8e91984650236212b8d8d5d5cf8f6026be9a61e9aecc3666413dfdbe6ecb272a359578b6f96849abeb60537f15ee902bbd53017aef"}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={r11, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf3, &(0x7f0000001400)=[{}], 0x8, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x5e, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) ioctl$TUNSETIFINDEX(r10, 0x400454da, &(0x7f0000001640)=r13) bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@base={0x1d, 0x6, 0x1, 0x101, 0xa00, r4, 0x6, '\x00', r1, r11, 0x1, 0x3}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001700)={0x1b, 0x0, 0x0, 0x3, 0x0, r12, 0x1, '\x00', r1, r11, 0x5, 0x3, 0x2}, 0x48) 3.422477529s ago: executing program 2 (id=44204): socketpair$tipc(0x1e, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0, 0xfc, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000240), &(0x7f00000002c0), 0x8, 0x4f, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x4, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000540)={r3}, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r5, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) close(r4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r6) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) 3.255255026s ago: executing program 4 (id=44206): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811eb00", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000005"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.time_recursive\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/uts\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 3.254406606s ago: executing program 1 (id=44207): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x32, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7080000000000007b8af8ff00000000b7080000e1ffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000058230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000040000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095000000000000008510000006000000181a0000", @ANYRES32=r0, @ANYBLOB="0000000000000000d7c10000efffffffb7080000000000007b8af8ff00000000b7080000150400007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000001856000008000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f0000000040)='GPL\x00', 0x100, 0x51, &(0x7f0000000080)=""/81, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x9, 0x200, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[r0], &(0x7f0000000200)=[{0x1a0, 0x3, 0x1, 0x7}, {0x3, 0x3, 0x4, 0x1}, {0x2, 0x4, 0xc}, {0x1, 0x2, 0xc, 0xc}, {0x2, 0x4, 0xa}, {0x4, 0x2, 0x5, 0x8}], 0x10, 0x8}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='nmi_handler\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0xff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_es_find_extent_range_exit\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100), 0x1001) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open$cgroup(&(0x7f0000000b00)={0x4, 0x80, 0x0, 0x43, 0x0, 0x40, 0x0, 0x0, 0x100000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext, 0x8410, 0x7ff, 0x1, 0x0, 0xa91b, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000000000}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10001, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x50}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x19, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r9, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a888e", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x4c) 3.253203986s ago: executing program 2 (id=44208): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xc, [@ptr={0xf}, @var={0x6, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x0, 0x2e, 0x0, 0x61, 0x5f, 0x5f, 0x30]}}, &(0x7f0000000a40)=""/4096, 0x40, 0x1000, 0x0, 0x6}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x9, 0x1c, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100}, [@jmp={0x5, 0x0, 0x0, 0x1, 0x1, 0xffffffffffffffff, 0xfffffffffffffffc}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x138}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x866f}]}, &(0x7f00000003c0)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x41100, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xc, 0x8, 0x5}, 0x10, 0x0, r0, 0x4, &(0x7f0000000600)=[r1, r1, r1, r1, r1, r1, r1, r1, r1], &(0x7f0000000640)=[{0x2, 0x3, 0xf, 0x5}, {0x4, 0x2, 0x8, 0x2}, {0x4, 0x4, 0x8, 0xb}, {0x1, 0x1, 0x4, 0xa}]}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x1a, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_idx={0x18, 0xa}, @ldst={0x3, 0x1, 0x2, 0xbafe9f20add48708, 0xb, 0xffffffffffffffe0, 0x4}, @map_fd={0x18, 0x8, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2800000, 0x0, 0x0, 0x0, 0x5d02}, @call={0x85, 0x0, 0x0, 0xd3}, @generic={0x1f, 0x9, 0xa, 0x1000, 0x6}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x0, 0xc, 0x0, 0xfffffffb}, 0x10, 0x584f, r4, 0x7, 0x0, &(0x7f0000000740)=[{0x1, 0x2, 0xd, 0x9}, {0x0, 0x3, 0x6, 0x9}, {0x2, 0x2, 0xa, 0x7}, {0x1, 0x2, 0x8, 0x7}, {0x2, 0x5, 0x0, 0x8}, {0x4, 0x3, 0xe}, {0x1, 0x4, 0xf}], 0x10, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r2}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 3.091637262s ago: executing program 1 (id=44209): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x32, &(0x7f00000006c0)=ANY=[@ANYBLOB="b7080000000000007b8af8ff00000000b7080000e1ffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000820085000000a5000000b7080000000000007b8af8ff00000000b7080000040000007b8af0ff00000000bfa10000000000000701735bcdb14be9d2a857f4ff0e0008020000ced700001830000000cb1c1f6300", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095000000000000008510000006000000181a0000", @ANYRES32=r0, @ANYBLOB="0000000000000000d7c10900efffffffb7080000000000007b8af8ff00000000b7080000150400007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000001856000008000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f0000000040)='GPL\x00', 0x100, 0x51, &(0x7f0000000080)=""/81, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x9, 0x200, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[r0], &(0x7f0000000200)=[{0x1a0, 0x3, 0x1, 0x7}, {0x3, 0x3, 0x4, 0x1}, {0x2, 0x4, 0xc}, {0x1, 0x2, 0xc, 0xc}, {0x2, 0x4, 0xa}, {0x4, 0x2, 0x5, 0x8}], 0x10, 0x8}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='nmi_handler\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000400)='syzkaller\x00', 0xd947, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000000), 0x400000) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r4, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00', r11}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x3, 0x5, 0x5, 0x20, 0x100, r10, 0x3, '\x00', 0x0, r10, 0x4, 0x5, 0x1}, 0x48) 3.090901512s ago: executing program 4 (id=44210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x43, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYBLOB="7734f626291a4dbd1f7c4dfb095082330c9e1bc5cdd1315e5afe3396fc8bfc32190a3979be835dc890e0b9fa1325444bf90ee733620086975c7e89f75a3dee781d84cb82ce9d713b61323349a972e6db1ad5eb37c53fc6d6569d575513b63a49bf3ce5a109553a793c36684cb49db68b1cbcf37696c481fea5b65776bdfaf67de339ab3acac92ce192e0f5fd59fe60e41a24c0f269319bf3a0cef23e4ed6836c7ea92a134c4d847486a06b2d6b4a74c32e15a92305758ef9cb095f7b64a3009078ed8a45e5f5d016bb79b72147e6b52169133ec8fddcb61cc4dba0b2f9bc06bc4be9711e4be5b818079220455b5f9f15", @ANYRES64=r0], 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x81, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x32, 0xffffffffffffffff, 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r3, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/557], &(0x7f0000000000)='GPL\x00', 0x2, 0xd2, &(0x7f0000000040)=""/210}, 0x70) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800009b3e00000000000000000000006b513200ff0f00009500000001000000"], 0x0}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r10, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) mkdir(&(0x7f0000000540)='./file1\x00', 0x0) 2.61648519s ago: executing program 1 (id=44211): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000140)='qdisc_create\x00', r5}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r8, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0, 0x0, 0x0], 0x0, 0xb, &(0x7f0000000e00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000c00), &(0x7f0000000c40), 0x8, 0xc4, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', r9, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000010c0)={0x6, 0x21, &(0x7f0000000e80)=ANY=[@ANYBLOB="1800000000100000000000313051e40018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000220000008500000006000000180000004000000000000000010400001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000b00)='syzkaller\x00', 0xc5f, 0x0, 0x0, 0x41100, 0x0, '\x00', r9, 0x25, r6, 0x8, &(0x7f0000000fc0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000001000)={0x0, 0x0, 0x80000001, 0x6}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001040)=[r3, r10, r3, r10, r1], &(0x7f0000001080)=[{0x2, 0x4, 0xc, 0xb}, {0x3, 0x2, 0x2, 0x1}, {0x4, 0x1, 0x7, 0x5}, {0x5, 0x3, 0x4, 0x7}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r11}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00'}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000140)={r2, r8}, 0xc) write$cgroup_pid(r8, &(0x7f0000000980), 0x12) 2.587900842s ago: executing program 4 (id=44212): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001780), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002900)={r1, 0x20, &(0x7f00000028c0)={&(0x7f00000017c0)=""/195, 0xc3, 0x0, &(0x7f00000018c0)=""/4096, 0x1000}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000029c0)={0x1a, 0x7, &(0x7f0000002940)=ANY=[@ANYBLOB="180000001f000000000000000700000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000185700000e000000000000000000000095000000000003009d5e"], &(0x7f0000000740)='syzkaller\x00', 0x40, 0x1000, &(0x7f0000000780)=""/4096, 0x41000, 0x28, '\x00', r2, 0x7, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, 0xffffffffffffffff, 0x7, 0x0, &(0x7f0000002a80)=[{0x4, 0x1, 0xd, 0xa}, {0x0, 0x5, 0x8, 0x2}, {0x0, 0x3, 0x1, 0xa}, {0x2, 0x2, 0x7, 0x7}, {0x3, 0x4, 0x0, 0xa}, {0x5, 0x2, 0xc, 0x2}, {0x3, 0x3, 0x0, 0x1}], 0x10, 0x8001}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r4, 0x4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000b40)={'ipvlan0\x00', 0x2}) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x1c}, {0x6}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0095000000000000000000000000000000000000000000004c1c8c8213e0775d960068c3c02bb96fa0ae13bfb1f5db1588d0d065ecd5a743320f64d74afb68116ad08cf32fde50f87f5cabc0dbacb555f5f376524089efc1beca078e14b7c553500bb06788b1c84c6a9f481dd9683cf85f00c1734f14c4bb515a8b7a6a2d5dc3061e35413045"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000a00)='ext4_da_reserve_space\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x0, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00'}, 0x9) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_ext_handle_unwritten_extents\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) 2.34181596s ago: executing program 0 (id=44184): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_ext_rm_idx\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_ext_rm_idx\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r5}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r7}, 0x10) write$cgroup_int(r11, &(0x7f00000000c0), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) 2.168186937s ago: executing program 0 (id=44213): openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x200040, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000040000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000080), &(0x7f0000000280)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r8}, &(0x7f0000000280), &(0x7f00000002c0)=r9}, 0x20) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r11}, 0x10) ioctl$TUNSETOFFLOAD(r10, 0x40086607, 0x20001412) 2.1102488s ago: executing program 4 (id=44214): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000261000000600000018140000", @ANYRES32=r0, @ANYBLOB="00000000000000001600000001000000180000000000000000000000000000009500000000000000360a000000000000180200002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000720afbff0000000485000000060000009500000000000000d582a27ce32b3947c7c45798672fcaf17e2b51e4404c630e959cc93ee9330cfe642b3f8ba76956f1fc3004640135562bf8621156cc6699e3075b151c08388c0ca3aeff2b52cdca7798f1354cf55fc4a3dcec3062ac8d686ad3dd8a4b4a7fda190a97bea718"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x78) 534.837289ms ago: executing program 1 (id=44215): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40286608, &(0x7f0000000540)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r1}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r9}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 471.884002ms ago: executing program 4 (id=44216): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xfffff801}, 0x48) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8a}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r6 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='memory.swap.high\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f00000002c0)=0x4, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0xb) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 227.707101ms ago: executing program 4 (id=44217): perf_event_open(&(0x7f0000000b00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000dc0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaa2f8d6c19574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3002208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33384253af570f4ef9c0254afdd89c73943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76d1378482b703043f4b2497ae5602473d8c1bb627d5f73790476a4a2e8b1f71c24e341d464b9a4c7b5d3b4da40dda928e39c60964dd298c0ad0496d8c54073ad6f8d25dd7ab695a7a8cc8d9a95ef202213f11fbc9505f266cbbe737a766893b61458800d85e75312b0d37adfff6a75bad78f0538f3122b2eab3dcd58b853b18008886075f9e177ccc1e71ef2e5ac0b493a06fb9bc2b605593674736b9911e671b6a53331d0e9c20847528ae4e601bc696"], &(0x7f0000000000)='GPL\x00', 0xfffffffb, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x1f}, 0x90) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='jbd2_handle_stats\x00', r0}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r1) close(r2) socketpair(0x1, 0x801, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) close(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0x2, 0x92, &(0x7f0000000240)=""/146}, 0x90) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x5, 0xdf6, 0x3f, 0x2000, 0xffffffffffffffff, 0x9, '\x00', 0x0, r2, 0x2, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000036c0)=ANY=[@ANYBLOB="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"/3318], &(0x7f0000001000)='GPL\x00'}, 0x53) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) syz_clone(0x1a8a1103, 0x0, 0xfffffffffffffe7f, 0x0, 0x0, 0x0) 198.813152ms ago: executing program 1 (id=44218): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000880)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffc7d}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000700)='mm_lru_insertion\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000002c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r4, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x3, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYBLOB="bc36c5df4bb9d854874fdc7e1d83f02f7b21d7251bb8b7d9a59db89d3dc9801826d0fae32ce6f6f9ab805767d84e2fb27ee963c82111354f51"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r9}, 0x10) 0s ago: executing program 1 (id=44219): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='rose0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) kernel console output (not intermixed with test programs): r that may corrupt user memory! [ 2021.907913][ T1676] syz.4.38657[1676] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2021.959271][ T1679] device wg2 left promiscuous mode [ 2021.983030][ T1679] device wg2 entered promiscuous mode [ 2022.610729][ T1719] device syzkaller0 entered promiscuous mode [ 2022.992048][ T1762] syz.0.38710[1762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2022.992101][ T1762] syz.0.38710[1762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2023.017863][ T1762] syz.0.38710[1762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2023.052684][ T1762] syz.0.38710[1762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2023.612193][ T1785] device syzkaller0 entered promiscuous mode [ 2023.731266][ T1796] device syzkaller0 entered promiscuous mode [ 2023.974249][ T1793] device veth0_vlan left promiscuous mode [ 2024.080254][ T1793] device veth0_vlan entered promiscuous mode [ 2024.499665][ T1824] device syzkaller0 entered promiscuous mode [ 2025.011917][ T1847] device veth0_vlan left promiscuous mode [ 2025.024991][ T1847] device veth0_vlan entered promiscuous mode [ 2025.086083][ T1857] device veth0_vlan left promiscuous mode [ 2025.117473][ T1857] device veth0_vlan entered promiscuous mode [ 2025.244405][ T1873] device vxcan1 entered promiscuous mode [ 2025.366592][ T1890] device syzkaller0 entered promiscuous mode [ 2025.684032][ T1901] device veth0_vlan left promiscuous mode [ 2025.740210][ T1901] device veth0_vlan entered promiscuous mode [ 2025.906378][ T9617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2025.914486][ T9617] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2025.926289][ T9617] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2027.113271][ T1973] device syzkaller0 entered promiscuous mode [ 2028.236504][ T2027] syz.0.38822[2027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2028.236542][ T2027] syz.0.38822[2027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2028.665627][ T2048] device syzkaller0 entered promiscuous mode [ 2030.422498][ T2154] syz.0.38874[2154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2030.423298][ T2154] syz.0.38874[2154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2031.260862][ T2178] device syzkaller0 entered promiscuous mode [ 2031.867987][ T2198] bridge0: port 1(bridge_slave_0) entered blocking state [ 2031.885821][ T2198] bridge0: port 1(bridge_slave_0) entered disabled state [ 2031.893224][ T2198] device bridge_slave_0 entered promiscuous mode [ 2031.910272][ T2198] bridge0: port 2(bridge_slave_1) entered blocking state [ 2031.927175][ T2198] bridge0: port 2(bridge_slave_1) entered disabled state [ 2031.934440][ T2198] device bridge_slave_1 entered promiscuous mode [ 2032.054835][ T2198] bridge0: port 2(bridge_slave_1) entered blocking state [ 2032.061711][ T2198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2032.068815][ T2198] bridge0: port 1(bridge_slave_0) entered blocking state [ 2032.075578][ T2198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2032.119472][T32609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2032.139236][T32609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.177876][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2032.185121][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2032.204400][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2032.224463][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2032.233771][T25874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2032.240627][T25874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2032.279594][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2032.326351][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2032.344530][T25874] bridge0: port 2(bridge_slave_1) entered blocking state [ 2032.351419][T25874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2032.369042][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2032.380489][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2032.388333][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2032.396276][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2032.405747][ T2229] device wg2 left promiscuous mode [ 2032.430130][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2032.441744][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2032.590198][ T1269] device bridge_slave_1 left promiscuous mode [ 2032.596367][ T1269] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.603943][ T1269] device bridge_slave_0 left promiscuous mode [ 2032.610236][ T1269] bridge0: port 1(bridge_slave_0) entered disabled state [ 2032.618063][ T1269] device veth0_vlan left promiscuous mode [ 2032.679941][ T2198] device veth0_vlan entered promiscuous mode [ 2032.688848][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2032.704469][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2032.719097][ T2198] device veth1_macvtap entered promiscuous mode [ 2032.726046][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2032.733388][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2032.741302][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2032.750030][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2032.758484][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2032.777440][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2032.785490][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2032.793866][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2032.802316][T28594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2032.811421][ T2251] device acsec0 entered promiscuous mode [ 2032.966729][ T2268] : renamed from pim6reg1 [ 2034.159582][ T2315] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 2035.133487][ T2354] device wg2 entered promiscuous mode [ 2036.413406][ T2414] device pim6reg1 entered promiscuous mode [ 2036.657571][ T2438] device veth1_macvtap left promiscuous mode [ 2036.669134][ T2438] device veth1_macvtap entered promiscuous mode [ 2036.703095][ T2438] device macsec0 entered promiscuous mode [ 2036.910112][ T2450] device pim6reg1 entered promiscuous mode [ 2041.272875][ T2630] device syzkaller0 entered promiscuous mode [ 2043.243734][ T2711] device sit0 left promiscuous mode [ 2043.720376][ T2718] device sit0 entered promiscuous mode [ 2043.809591][ T2740] device syzkaller0 entered promiscuous mode [ 2045.028670][ T2807] device syzkaller0 entered promiscuous mode [ 2045.173765][ T2805] bridge0: port 1(bridge_slave_0) entered blocking state [ 2045.180745][ T2805] bridge0: port 1(bridge_slave_0) entered disabled state [ 2045.196117][ T2805] device bridge_slave_0 entered promiscuous mode [ 2045.203131][ T2805] bridge0: port 2(bridge_slave_1) entered blocking state [ 2045.210464][ T2805] bridge0: port 2(bridge_slave_1) entered disabled state [ 2045.239825][ T2805] device bridge_slave_1 entered promiscuous mode [ 2045.405968][ T2805] bridge0: port 2(bridge_slave_1) entered blocking state [ 2045.412855][ T2805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2045.419952][ T2805] bridge0: port 1(bridge_slave_0) entered blocking state [ 2045.426725][ T2805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2045.546052][T25392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2045.561804][T25392] bridge0: port 1(bridge_slave_0) entered disabled state [ 2045.570652][T25392] bridge0: port 2(bridge_slave_1) entered disabled state [ 2045.589992][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2045.600394][T25389] bridge0: port 1(bridge_slave_0) entered blocking state [ 2045.607245][T25389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2045.635984][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2045.649539][T25389] bridge0: port 2(bridge_slave_1) entered blocking state [ 2045.656402][T25389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2045.685250][T28613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2045.693224][T28613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2045.733672][ T2805] device veth0_vlan entered promiscuous mode [ 2045.744600][T28598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2045.753462][T28598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2045.763343][T28598] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2045.775294][T28598] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2045.790049][ T2805] device veth1_macvtap entered promiscuous mode [ 2045.801143][T25392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2045.814533][T28613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2045.830381][T25392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2045.951280][ T1269] device bridge_slave_1 left promiscuous mode [ 2045.959823][ T1269] bridge0: port 2(bridge_slave_1) entered disabled state [ 2045.969028][ T1269] device O3c left promiscuous mode [ 2045.974426][ T1269] bridge0: port 1(O3c) entered disabled state [ 2045.983102][ T1269] device veth0_vlan left promiscuous mode [ 2047.597361][ T2913] : renamed from pim6reg1 [ 2048.885681][ T2952] device pim6reg1 entered promiscuous mode [ 2049.118809][ T2961] syz.1.39204[2961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2049.118869][ T2961] syz.1.39204[2961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2050.398681][ T3040] syz.1.39239[3040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2050.411674][ T3040] syz.1.39239[3040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2050.526542][ T3048] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 2050.568456][ T3044] : renamed from pim6reg1 [ 2051.729582][ T3100] syz.0.39263[3100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2051.729640][ T3100] syz.0.39263[3100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2053.025077][ T3131] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 2054.211710][ T3168] device syzkaller0 entered promiscuous mode [ 2054.267938][ T3168] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2057.124076][ T3219] tap0: tun_chr_ioctl cmd 1074025692 [ 2059.694724][ T3346] device syzkaller0 entered promiscuous mode [ 2060.782692][ T3392] syz.3.39375[3392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2060.782747][ T3392] syz.3.39375[3392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2061.869651][ T3436] syz.1.39391[3436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2061.887032][ T3436] syz.1.39391[3436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2061.922191][ T3436] device syzkaller0 entered promiscuous mode [ 2062.637356][ T3469] device sit0 entered promiscuous mode [ 2065.956110][ T3551] device syzkaller0 entered promiscuous mode [ 2066.006941][ T3554] syz.3.39439[3554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2066.006992][ T3554] syz.3.39439[3554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2066.092097][ T3564] device syzkaller0 entered promiscuous mode [ 2067.099502][ T3589] device veth1_macvtap left promiscuous mode [ 2067.105396][ T3589] device macsec0 left promiscuous mode [ 2067.130151][ T3592] device veth1_macvtap entered promiscuous mode [ 2067.136683][ T3592] device macsec0 entered promiscuous mode [ 2067.798519][ T3606] syz.4.39457[3606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2067.798580][ T3606] syz.4.39457[3606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2068.086578][ T3616] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4095 (only 8 groups) [ 2069.602988][ T3642] bridge0: port 1(bridge_slave_0) entered blocking state [ 2069.610210][ T3642] bridge0: port 1(bridge_slave_0) entered disabled state [ 2069.617855][ T3642] device bridge_slave_0 entered promiscuous mode [ 2069.639229][ T3642] bridge0: port 2(bridge_slave_1) entered blocking state [ 2069.655835][ T3642] bridge0: port 2(bridge_slave_1) entered disabled state [ 2069.678247][ T3642] device bridge_slave_1 entered promiscuous mode [ 2069.971239][ T3642] bridge0: port 2(bridge_slave_1) entered blocking state [ 2069.978112][ T3642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2069.985220][ T3642] bridge0: port 1(bridge_slave_0) entered blocking state [ 2069.991991][ T3642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2070.164426][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2070.174179][T25389] bridge0: port 1(bridge_slave_0) entered disabled state [ 2070.210304][T25389] bridge0: port 2(bridge_slave_1) entered disabled state [ 2070.239897][T28613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2070.252306][T28613] bridge0: port 1(bridge_slave_0) entered blocking state [ 2070.259197][T28613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2070.299953][T28613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2070.328036][T28613] bridge0: port 2(bridge_slave_1) entered blocking state [ 2070.334881][T28613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2070.383896][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2070.392542][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2070.421920][ T2193] device bridge_slave_1 left promiscuous mode [ 2070.435231][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2070.450758][ T2193] device bridge_slave_0 left promiscuous mode [ 2070.460781][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2070.476340][ T2193] device veth1_macvtap left promiscuous mode [ 2070.487127][ T2193] device veth0_vlan left promiscuous mode [ 2070.618449][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2070.638095][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2070.651824][ T3642] device veth0_vlan entered promiscuous mode [ 2070.668337][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2070.679117][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2070.712802][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2070.720619][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2070.758356][ T3642] device veth1_macvtap entered promiscuous mode [ 2070.784360][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2070.796270][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2070.831868][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2070.872656][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2070.885167][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2070.924297][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2070.956307][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2073.154426][ T3724] device syzkaller0 entered promiscuous mode [ 2073.220880][ T3728] geneve1: tun_chr_ioctl cmd 1074025677 [ 2073.226517][ T3728] geneve1: linktype set to 1 [ 2076.508076][ T3809] device syzkaller0 entered promiscuous mode [ 2076.816546][ T3815] device syzkaller0 entered promiscuous mode [ 2077.133223][ T3831] device macsec0 entered promiscuous mode [ 2078.428120][ T3870] syz.0.39561[3870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2078.428177][ T3870] syz.0.39561[3870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2078.458372][ T3870] syz.0.39561[3870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2078.482906][ T3870] syz.0.39561[3870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2078.811862][ T3876] bridge0: port 2(bridge_slave_1) entered disabled state [ 2078.839502][ T3876] device bridge0 left promiscuous mode [ 2078.886539][ T3876] device bridge_slave_1 left promiscuous mode [ 2078.892615][ T3876] bridge0: port 2(bridge_slave_1) entered disabled state [ 2078.902843][ T3876] device bridge_slave_0 left promiscuous mode [ 2078.909027][ T3876] bridge0: port 1(bridge_slave_0) entered disabled state [ 2079.514975][ T3919] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2081.717499][ T3997] syz.2.39610[3997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2081.717546][ T3997] syz.2.39610[3997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2083.589483][ T4075] bridge0: port 1(bridge_slave_0) entered disabled state [ 2083.661799][ T4079] O3c: renamed from bridge_slave_0 [ 2088.780323][ T4169] device pim6reg1 entered promiscuous mode [ 2089.922610][ T4195] device wlan0 entered promiscuous mode [ 2091.201029][ T4225] device pim6reg1 entered promiscuous mode [ 2092.308743][ T4297] device syzkaller0 entered promiscuous mode [ 2092.338517][ T4288] device pim6reg1 entered promiscuous mode [ 2092.784623][ T4365] syz.4.39763[4365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2092.784671][ T4365] syz.4.39763[4365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2092.892138][ T4374] device wg2 entered promiscuous mode [ 2092.912922][ T4374] bridge0: port 3(veth0_to_batadv) entered blocking state [ 2092.920587][ T4374] bridge0: port 3(veth0_to_batadv) entered disabled state [ 2092.928214][ T4374] device veth0_to_batadv entered promiscuous mode [ 2092.934556][ T4374] bridge0: port 3(veth0_to_batadv) entered blocking state [ 2092.941413][ T4374] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 2092.949734][ T4374] device veth0_to_batadv left promiscuous mode [ 2092.955876][ T4374] bridge0: port 3(veth0_to_batadv) entered disabled state [ 2093.158907][ T4399] syz.3.39778[4399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2093.158953][ T4399] syz.3.39778[4399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2093.196158][ T4405] syz.3.39781[4405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2093.207593][ T4405] syz.3.39781[4405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2093.478308][ T4433] device veth0_vlan left promiscuous mode [ 2093.497563][ T4433] device veth0_vlan entered promiscuous mode [ 2100.015421][ T4724] device syzkaller0 entered promiscuous mode [ 2100.524210][ T4746] device syz_tun entered promiscuous mode [ 2102.710967][ T4888] bridge0: port 1(bridge_slave_0) entered blocking state [ 2102.719179][ T4888] bridge0: port 1(bridge_slave_0) entered disabled state [ 2102.727097][ T4888] device bridge_slave_0 entered promiscuous mode [ 2102.735152][ T4888] bridge0: port 2(bridge_slave_1) entered blocking state [ 2102.742470][ T4888] bridge0: port 2(bridge_slave_1) entered disabled state [ 2102.751729][ T4888] device bridge_slave_1 entered promiscuous mode [ 2102.802320][ T4888] bridge0: port 2(bridge_slave_1) entered blocking state [ 2102.809280][ T4888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2102.816383][ T4888] bridge0: port 1(bridge_slave_0) entered blocking state [ 2102.823143][ T4888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2102.867221][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2102.874856][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2102.883226][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2102.906580][T28602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2102.915510][T28602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2102.932644][ T4888] device veth0_vlan entered promiscuous mode [ 2102.940582][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2102.949212][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2102.959443][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2102.968784][T25389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2102.985208][ T4888] device veth1_macvtap entered promiscuous mode [ 2103.031735][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2103.056407][T25392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2103.067965][T25392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2103.957847][ T1269] device bridge_slave_1 left promiscuous mode [ 2103.963921][ T1269] bridge0: port 2(bridge_slave_1) entered disabled state [ 2104.007971][ T1269] device bridge_slave_0 left promiscuous mode [ 2104.055741][ T1269] bridge0: port 1(bridge_slave_0) entered disabled state [ 2104.085392][ T1269] device veth1_macvtap left promiscuous mode [ 2104.093369][ T1269] device veth0_vlan left promiscuous mode [ 2105.118551][ T4941] device veth0_vlan left promiscuous mode [ 2105.124768][ T4941] device veth0_vlan entered promiscuous mode [ 2105.275621][ T4975] device syzkaller0 entered promiscuous mode [ 2105.496239][ T4996] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 153 (only 8 groups) [ 2105.526623][ T4991] syz.4.40023[4991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2105.526682][ T4991] syz.4.40023[4991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2107.942596][ T5082] syz.2.40062[5082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2108.256672][ T5082] syz.2.40062[5082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2113.783451][ T5254] device syzkaller0 entered promiscuous mode [ 2117.613740][ T5409] device syzkaller0 entered promiscuous mode [ 2119.381970][ T5473] device syzkaller0 entered promiscuous mode [ 2119.917618][ T5522] device syzkaller0 entered promiscuous mode [ 2120.890605][ T5574] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4095 (only 8 groups) [ 2121.345860][ T5588] device veth0_vlan left promiscuous mode [ 2121.495031][ T5588] device veth0_vlan entered promiscuous mode [ 2122.178245][ T5626] device veth0_vlan left promiscuous mode [ 2122.261341][ T5626] device veth0_vlan entered promiscuous mode [ 2122.308753][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2122.326459][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2122.396235][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2122.813868][ T5648] device veth0_vlan left promiscuous mode [ 2122.922883][ T5648] device veth0_vlan entered promiscuous mode [ 2124.594173][ T5711] ʮ}p: renamed from pim6reg1 [ 2125.182441][ T5714] bridge0: port 1(bridge_slave_0) entered blocking state [ 2125.191999][ T5714] bridge0: port 1(bridge_slave_0) entered disabled state [ 2125.200134][ T5714] device bridge_slave_0 entered promiscuous mode [ 2125.207079][ T5714] bridge0: port 2(bridge_slave_1) entered blocking state [ 2125.213982][ T5714] bridge0: port 2(bridge_slave_1) entered disabled state [ 2125.221514][ T5714] device bridge_slave_1 entered promiscuous mode [ 2125.328671][ T5714] bridge0: port 2(bridge_slave_1) entered blocking state [ 2125.335531][ T5714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2125.342736][ T5714] bridge0: port 1(bridge_slave_0) entered blocking state [ 2125.349515][ T5714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2125.400002][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2125.411789][T32610] bridge0: port 1(bridge_slave_0) entered disabled state [ 2125.548577][T32610] bridge0: port 2(bridge_slave_1) entered disabled state [ 2125.641806][ T4948] device veth1_macvtap left promiscuous mode [ 2125.837648][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2125.845647][T25873] bridge0: port 1(bridge_slave_0) entered blocking state [ 2125.852519][T25873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2125.862278][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2125.878939][T25873] bridge0: port 2(bridge_slave_1) entered blocking state [ 2125.885809][T25873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2125.899179][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2125.907727][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2125.925718][ T5714] device veth0_vlan entered promiscuous mode [ 2125.950724][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2125.959426][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2125.973784][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2125.987986][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2126.000418][ T5714] device veth1_macvtap entered promiscuous mode [ 2126.008598][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2126.017628][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2126.024912][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2126.038914][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2126.047637][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2126.072160][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2126.083794][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2126.092021][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2126.100789][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2126.128331][ T5771] device syzkaller0 entered promiscuous mode [ 2131.905248][ T5998] ʮ}p: renamed from pim6reg1 [ 2133.474563][ T6047] device wg2 entered promiscuous mode [ 2135.305901][ T6080] device pim6reg1 entered promiscuous mode [ 2135.742944][ T6091] device syzkaller0 entered promiscuous mode [ 2135.983109][ T6105] bridge0: port 1(bridge_slave_0) entered blocking state [ 2135.990027][ T6105] bridge0: port 1(bridge_slave_0) entered disabled state [ 2135.999493][ T6105] device bridge_slave_0 entered promiscuous mode [ 2136.006441][ T6105] bridge0: port 2(bridge_slave_1) entered blocking state [ 2136.013279][ T6105] bridge0: port 2(bridge_slave_1) entered disabled state [ 2136.020610][ T6105] device bridge_slave_1 entered promiscuous mode [ 2136.073846][ T6105] bridge0: port 2(bridge_slave_1) entered blocking state [ 2136.080759][ T6105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2136.087848][ T6105] bridge0: port 1(bridge_slave_0) entered blocking state [ 2136.094671][ T6105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2136.202915][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2136.220463][T10765] bridge0: port 1(bridge_slave_0) entered disabled state [ 2136.257262][T10765] bridge0: port 2(bridge_slave_1) entered disabled state [ 2136.281461][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2136.289621][T25873] bridge0: port 1(bridge_slave_0) entered blocking state [ 2136.296476][T25873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2136.367176][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2136.398979][T25873] bridge0: port 2(bridge_slave_1) entered blocking state [ 2136.405863][T25873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2136.472230][ T6105] device veth0_vlan entered promiscuous mode [ 2136.537785][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2136.546982][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2136.554800][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2136.620829][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2136.638760][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2136.652785][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2136.728137][ T6105] device veth1_macvtap entered promiscuous mode [ 2136.754003][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2136.762825][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2136.774466][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2136.813275][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2136.822240][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2136.846701][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2136.854890][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2137.412306][ T2193] device bridge_slave_1 left promiscuous mode [ 2137.418283][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2137.497206][ T2193] device bridge_slave_0 left promiscuous mode [ 2137.560039][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2137.630417][ T2193] device veth1_macvtap left promiscuous mode [ 2137.638621][ T2193] device veth0_vlan left promiscuous mode [ 2138.826602][ T6226] device pim6reg1 entered promiscuous mode [ 2140.176549][ T6288] device pim6reg1 entered promiscuous mode [ 2144.535509][ T6432] bridge0: port 1(bridge_slave_0) entered blocking state [ 2144.542385][ T6432] bridge0: port 1(bridge_slave_0) entered disabled state [ 2144.550255][ T6432] device bridge_slave_0 entered promiscuous mode [ 2144.558925][ T6432] bridge0: port 2(bridge_slave_1) entered blocking state [ 2144.565832][ T6432] bridge0: port 2(bridge_slave_1) entered disabled state [ 2144.573356][ T6432] device bridge_slave_1 entered promiscuous mode [ 2144.658449][ T6432] bridge0: port 2(bridge_slave_1) entered blocking state [ 2144.665308][ T6432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2144.672445][ T6432] bridge0: port 1(bridge_slave_0) entered blocking state [ 2144.679209][ T6432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2144.706352][T25392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2144.713756][T25392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2144.729598][T25392] bridge0: port 2(bridge_slave_1) entered disabled state [ 2144.768159][T25392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2144.780650][T25392] bridge0: port 2(bridge_slave_1) entered blocking state [ 2144.787534][T25392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2144.820761][T25392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2144.855948][T28598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2144.865603][T28598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2144.964352][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2144.976490][ T6432] device veth0_vlan entered promiscuous mode [ 2144.986037][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2144.993778][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2145.029452][ T6432] device veth1_macvtap entered promiscuous mode [ 2145.040271][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2145.054753][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2145.085992][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2145.160582][ T2193] device bridge_slave_1 left promiscuous mode [ 2145.173007][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2145.182319][ T2193] device bridge_slave_0 left promiscuous mode [ 2145.189428][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2145.197524][ T2193] device veth1_macvtap left promiscuous mode [ 2146.089762][ T6486] syz.3.40645[6486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2146.089806][ T6486] syz.3.40645[6486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2148.545654][ T6546] device syzkaller0 entered promiscuous mode [ 2150.506167][ T6589] device veth0_vlan left promiscuous mode [ 2150.628781][ T6589] device veth0_vlan entered promiscuous mode [ 2150.769718][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2150.780713][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2150.801926][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2151.934271][ T6641] : renamed from vlan0 [ 2154.512227][ T6721] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2154.617977][ T6731] device veth1_macvtap left promiscuous mode [ 2154.628064][ T6731] device macsec0 left promiscuous mode [ 2155.822696][ T6803] syz.1.40776[6803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2159.761239][ T6972] device syzkaller0 entered promiscuous mode [ 2160.266942][ T7008] device syzkaller0 entered promiscuous mode [ 2161.162628][ T7040] device pim6reg1 entered promiscuous mode [ 2169.726759][ T7335] : renamed from ipvlan1 [ 2172.836075][ T7433] device sit0 entered promiscuous mode [ 2173.130245][ T7441] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 2173.896763][ T7471] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 2176.165301][ T7549] syz.0.41067[7549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2176.165479][ T7549] syz.0.41067[7549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2176.208760][ T7549] syz.0.41067[7549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2176.220464][ T7549] syz.0.41067[7549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2177.319504][ T7604] syz.4.41088[7604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2177.360640][ T7604] syz.4.41088[7604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2178.712664][ T7660] bridge0: port 1(bridge_slave_0) entered blocking state [ 2178.736443][ T7660] bridge0: port 1(bridge_slave_0) entered disabled state [ 2178.743967][ T7660] device bridge_slave_0 entered promiscuous mode [ 2178.936846][ T7660] bridge0: port 2(bridge_slave_1) entered blocking state [ 2178.943715][ T7660] bridge0: port 2(bridge_slave_1) entered disabled state [ 2179.006937][ T7660] device bridge_slave_1 entered promiscuous mode [ 2179.258135][ T7660] bridge0: port 2(bridge_slave_1) entered blocking state [ 2179.264996][ T7660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2179.272106][ T7660] bridge0: port 1(bridge_slave_0) entered blocking state [ 2179.278884][ T7660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2179.438350][T25869] bridge0: port 1(bridge_slave_0) entered disabled state [ 2179.466633][T25869] bridge0: port 2(bridge_slave_1) entered disabled state [ 2179.502943][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2179.511050][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2179.544590][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2179.554109][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2179.563805][ T7686] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2179.575448][T25873] bridge0: port 1(bridge_slave_0) entered blocking state [ 2179.582313][T25873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2179.596212][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2179.619249][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2179.647096][T25873] bridge0: port 2(bridge_slave_1) entered blocking state [ 2179.653962][T25873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2179.675910][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2179.698514][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2179.717163][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2179.725077][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2179.761453][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2179.780758][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2179.816241][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2179.830113][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2179.856982][ T7660] device veth0_vlan entered promiscuous mode [ 2179.868295][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2179.875698][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2179.905135][ T7660] device veth1_macvtap entered promiscuous mode [ 2179.916733][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2179.924776][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2179.939415][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2179.979170][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2179.992505][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2180.037962][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2180.046304][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2180.279519][ T2193] device bridge_slave_1 left promiscuous mode [ 2180.285468][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2180.306522][ T2193] device bridge_slave_0 left promiscuous mode [ 2180.312469][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2180.337181][ T2193] device veth1_macvtap left promiscuous mode [ 2180.343018][ T2193] device veth0_vlan left promiscuous mode [ 2181.311536][ T7755] syz.3.41141[7755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2181.311581][ T7755] syz.3.41141[7755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2183.302304][ T7804] device pim6reg1 entered promiscuous mode [ 2183.571524][ T7825] device pim6reg1 entered promiscuous mode [ 2184.455013][ T7848] syz.2.41180[7848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2184.455102][ T7848] syz.2.41180[7848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2184.837963][ T7852] syz.2.41180[7852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2185.014574][ T7858] device syzkaller0 entered promiscuous mode [ 2185.041685][ T7852] syz.2.41180[7852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2187.157672][ T7906] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2187.772325][ T7918] device pim6reg1 entered promiscuous mode [ 2190.013567][ T8009] device macsec0 entered promiscuous mode [ 2190.872662][ T8050] device pim6reg1 entered promiscuous mode [ 2191.060357][ T8056] device veth0_vlan left promiscuous mode [ 2191.138681][ T8056] device veth0_vlan entered promiscuous mode [ 2191.416137][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2191.424335][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 2191.434175][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2191.497755][ T8070] device syzkaller0 entered promiscuous mode [ 2191.699161][ T8096] device syzkaller0 entered promiscuous mode [ 2191.899904][ T8109] device syzkaller0 entered promiscuous mode [ 2192.818596][ T8149] bridge0: port 3(veth0_to_batadv) entered blocking state [ 2192.826034][ T8149] bridge0: port 3(veth0_to_batadv) entered disabled state [ 2192.833684][ T8149] device veth0_to_batadv entered promiscuous mode [ 2192.844421][ T8149] bridge0: port 3(veth0_to_batadv) entered blocking state [ 2192.851393][ T8149] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 2192.873635][ T8149] device veth0_to_batadv left promiscuous mode [ 2193.180677][ T8149] bridge0: port 3(veth0_to_batadv) entered disabled state [ 2195.842135][ T8214] tap0: tun_chr_ioctl cmd 2147767506 [ 2196.981923][ T8253] device syzkaller0 entered promiscuous mode [ 2198.079891][ T8321] syz.3.41373[8321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2198.079947][ T8321] syz.3.41373[8321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2198.829801][ T8342] device syzkaller0 entered promiscuous mode [ 2204.831837][ T8514] vlan1: mtu greater than device maximum [ 2205.089707][ T8538] device syzkaller0 entered promiscuous mode [ 2207.256054][ T8622] bridge0: port 2(bridge_slave_1) entered disabled state [ 2207.298768][ T8622] bridge0: port 2(bridge_slave_1) entered blocking state [ 2207.305641][ T8622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2207.348070][ T8622] device bridge0 entered promiscuous mode [ 2207.573789][ T8655] syz.0.41498[8655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2207.573849][ T8655] syz.0.41498[8655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2207.606501][ T8655] syz.0.41498[8655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2207.628819][ T8655] syz.0.41498[8655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2207.642835][ T8655] syz.0.41498[8655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2207.673539][ T8655] syz.0.41498[8655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2207.710997][ T8661] device syzkaller0 entered promiscuous mode [ 2208.418904][ T8695] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 63 (only 8 groups) [ 2208.675605][ T8702] device syzkaller0 entered promiscuous mode [ 2209.939291][ T8754] device veth0_vlan left promiscuous mode [ 2210.061393][ T8754] device veth0_vlan entered promiscuous mode [ 2210.559832][ T8764] device pim6reg1 entered promiscuous mode [ 2210.896613][ T8784] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2211.044018][ T8788] device veth0_vlan left promiscuous mode [ 2211.118318][ T8788] device veth0_vlan entered promiscuous mode [ 2211.549512][ T8788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2211.592883][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2211.629508][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2211.706046][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 2219.001749][ T8933] device wg2 left promiscuous mode [ 2219.028974][ T8933] device wg2 entered promiscuous mode [ 2220.588826][ T9031] device pim6reg1 entered promiscuous mode [ 2220.731111][ T9045] bridge0: port 1(bridge_slave_0) entered blocking state [ 2220.740342][ T9045] bridge0: port 1(bridge_slave_0) entered disabled state [ 2220.747614][ T9045] device bridge_slave_0 entered promiscuous mode [ 2220.754557][ T9045] bridge0: port 2(bridge_slave_1) entered blocking state [ 2220.762131][ T9045] bridge0: port 2(bridge_slave_1) entered disabled state [ 2220.769601][ T9045] device bridge_slave_1 entered promiscuous mode [ 2220.872484][ T9045] bridge0: port 2(bridge_slave_1) entered blocking state [ 2220.879355][ T9045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2220.886455][ T9045] bridge0: port 1(bridge_slave_0) entered blocking state [ 2220.893233][ T9045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2220.916164][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2220.924567][T25869] bridge0: port 1(bridge_slave_0) entered disabled state [ 2220.934574][T25869] bridge0: port 2(bridge_slave_1) entered disabled state [ 2220.962924][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2221.003288][ T7117] bridge0: port 1(bridge_slave_0) entered blocking state [ 2221.010164][ T7117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2221.219080][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2221.306506][ T7117] bridge0: port 2(bridge_slave_1) entered blocking state [ 2221.313368][ T7117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2221.446481][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2221.454739][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2221.475219][ T9045] device veth0_vlan entered promiscuous mode [ 2221.482541][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2221.490719][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2221.606056][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2221.614307][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2221.625468][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2221.634822][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2221.649956][ T9045] device veth1_macvtap entered promiscuous mode [ 2221.658802][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2221.667051][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2221.674367][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2221.684785][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2221.696629][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2221.716301][ T7114] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2221.724397][ T7114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2221.736225][ T7114] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2221.744364][ T7114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2222.678076][ T4948] device bridge_slave_1 left promiscuous mode [ 2222.684067][ T4948] bridge0: port 2(bridge_slave_1) entered disabled state [ 2222.800546][ T4948] device bridge_slave_0 left promiscuous mode [ 2222.826768][ T4948] bridge0: port 1(bridge_slave_0) entered disabled state [ 2222.914990][ T4948] device veth1_macvtap left promiscuous mode [ 2223.244868][ T9116] device sit0 left promiscuous mode [ 2230.809713][ T9425] syz.3.41787[9425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2230.809763][ T9425] syz.3.41787[9425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2232.602527][ T9512] device syzkaller0 entered promiscuous mode [ 2234.100917][ T9575] Q6\bY4: renamed from lo [ 2234.595401][ T9595] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2235.040020][ T9605] device syzkaller0 entered promiscuous mode [ 2235.271708][ T9626] device pim6reg1 entered promiscuous mode [ 2236.217262][ T9667] device sit0 entered promiscuous mode [ 2239.841070][ T9773] syz.2.41924[9773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2239.841139][ T9773] syz.2.41924[9773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2242.733316][ T9902] device pim6reg1 entered promiscuous mode [ 2245.309240][T10036] device acsec0 entered promiscuous mode [ 2246.161064][T10069] device syzkaller0 entered promiscuous mode [ 2251.150479][T10263] bridge0: port 1(bridge_slave_0) entered blocking state [ 2251.157362][T10263] bridge0: port 1(bridge_slave_0) entered disabled state [ 2251.164646][T10263] device bridge_slave_0 entered promiscuous mode [ 2251.171644][T10263] bridge0: port 2(bridge_slave_1) entered blocking state [ 2251.178500][T10263] bridge0: port 2(bridge_slave_1) entered disabled state [ 2251.190062][T10263] device bridge_slave_1 entered promiscuous mode [ 2251.290551][T10263] bridge0: port 2(bridge_slave_1) entered blocking state [ 2251.297421][T10263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2251.304504][T10263] bridge0: port 1(bridge_slave_0) entered blocking state [ 2251.311310][T10263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2251.408728][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2251.416447][T10765] bridge0: port 1(bridge_slave_0) entered disabled state [ 2251.423627][T10765] bridge0: port 2(bridge_slave_1) entered disabled state [ 2251.461788][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2251.474810][T32608] bridge0: port 1(bridge_slave_0) entered blocking state [ 2251.481706][T32608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2251.491919][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2251.500596][T32608] bridge0: port 2(bridge_slave_1) entered blocking state [ 2251.507459][T32608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2251.516359][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2251.524571][T32608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2251.676234][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2251.723319][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2251.777447][T10263] device veth0_vlan entered promiscuous mode [ 2251.808764][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2251.822136][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2251.835757][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2251.843827][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2251.854074][T10263] device veth1_macvtap entered promiscuous mode [ 2251.864497][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2251.874301][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2251.882441][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2251.908175][ T7119] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2251.916735][ T7119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2252.111317][ T1269] device bridge_slave_1 left promiscuous mode [ 2252.119300][ T1269] bridge0: port 2(bridge_slave_1) entered disabled state [ 2252.135247][ T1269] device bridge_slave_0 left promiscuous mode [ 2252.149151][ T1269] bridge0: port 1(bridge_slave_0) entered disabled state [ 2252.163599][ T1269] device veth1_macvtap left promiscuous mode [ 2252.176595][ T1269] device veth0_vlan left promiscuous mode [ 2253.272664][T10337] device syzkaller0 entered promiscuous mode [ 2255.738621][T10405] device pim6reg1 entered promiscuous mode [ 2257.762498][T10488] syz.0.42207[10488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2257.762559][T10488] syz.0.42207[10488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2258.006908][T10507] : renamed from vlan0 [ 2258.397371][T10529] syz.0.42224[10529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2258.397429][T10529] syz.0.42224[10529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2259.301103][T10563] device syzkaller0 entered promiscuous mode [ 2259.647832][T10592] syz.0.42251[10592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2259.647891][T10592] syz.0.42251[10592] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2262.809787][T10704] bridge0: port 1(bridge_slave_0) entered blocking state [ 2263.014428][T10704] bridge0: port 1(bridge_slave_0) entered disabled state [ 2263.086173][T10704] device bridge_slave_0 entered promiscuous mode [ 2263.679343][T10704] bridge0: port 2(bridge_slave_1) entered blocking state [ 2263.686828][T10704] bridge0: port 2(bridge_slave_1) entered disabled state [ 2263.695978][T10704] device bridge_slave_1 entered promiscuous mode [ 2263.803391][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2263.814252][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2263.847955][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2263.868628][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2263.878739][T10765] bridge0: port 1(bridge_slave_0) entered blocking state [ 2263.885580][T10765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2263.909818][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2263.926226][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2263.950510][T10765] bridge0: port 2(bridge_slave_1) entered blocking state [ 2263.957387][T10765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2263.978929][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2263.996215][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2264.014737][T10704] device veth0_vlan entered promiscuous mode [ 2264.023388][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2264.032135][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2264.040805][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2264.048470][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2264.056437][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2264.070229][T10704] device veth1_macvtap entered promiscuous mode [ 2264.077498][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2264.090568][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2264.195947][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2269.159519][T10948] device syzkaller0 entered promiscuous mode [ 2269.159566][T10953] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 2269.589787][T10982] device sit0 entered promiscuous mode [ 2270.344643][T11034] device syzkaller0 entered promiscuous mode [ 2271.126551][T11081] device veth0_vlan left promiscuous mode [ 2271.132533][T11081] device veth0_vlan entered promiscuous mode [ 2271.144761][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2271.152679][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 2271.160834][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2271.342300][T11109] bridge0: port 1(bridge_slave_0) entered blocking state [ 2271.360070][T11109] bridge0: port 1(bridge_slave_0) entered disabled state [ 2271.371615][T11109] device bridge_slave_0 entered promiscuous mode [ 2271.388729][T11109] bridge0: port 2(bridge_slave_1) entered blocking state [ 2271.395568][T11109] bridge0: port 2(bridge_slave_1) entered disabled state [ 2271.409494][T11109] device bridge_slave_1 entered promiscuous mode [ 2271.804631][T11128] device veth1_macvtap left promiscuous mode [ 2272.121361][T11109] bridge0: port 2(bridge_slave_1) entered blocking state [ 2272.128239][T11109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2272.135315][T11109] bridge0: port 1(bridge_slave_0) entered blocking state [ 2272.142113][T11109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2272.159371][T11139] syz.2.42454[11139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2272.176554][ T7112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2272.195502][ T7112] bridge0: port 1(bridge_slave_0) entered disabled state [ 2272.206377][ T7112] bridge0: port 2(bridge_slave_1) entered disabled state [ 2272.228862][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2272.237214][T25874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2272.253179][T25874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2272.260055][T25874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2272.277369][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2272.285525][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2272.296616][T25873] bridge0: port 2(bridge_slave_1) entered blocking state [ 2272.303456][T25873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2272.322216][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2272.330508][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2272.339654][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2272.480004][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2272.702453][T11145] device vxcan1 entered promiscuous mode [ 2272.769386][T11109] device veth0_vlan entered promiscuous mode [ 2272.791728][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2272.800268][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2272.831606][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2272.840559][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2272.864030][ T7112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2272.872333][ T7112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2272.886493][ T7112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2272.906714][ T7112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2272.928846][T11109] device veth1_macvtap entered promiscuous mode [ 2273.026325][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2273.035033][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2273.061630][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2273.076080][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2273.085584][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2273.922097][ T1269] device bridge_slave_1 left promiscuous mode [ 2273.945851][ T1269] bridge0: port 2(bridge_slave_1) entered disabled state [ 2273.979984][ T1269] device bridge_slave_0 left promiscuous mode [ 2273.985998][ T1269] bridge0: port 1(bridge_slave_0) entered disabled state [ 2274.017411][ T1269] device veth1_macvtap left promiscuous mode [ 2277.589552][T11310] syz.0.42513[11310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2277.589613][T11310] syz.0.42513[11310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2277.651223][T11312] syz.0.42513[11312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2277.702940][T11312] syz.0.42513[11312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2278.177215][T11325] syz.4.42517[11325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2278.197331][T11325] syz.4.42517[11325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2278.730810][T11349] bridge0: port 1(bridge_slave_0) entered disabled state [ 2279.531288][T11374] FAULT_INJECTION: forcing a failure. [ 2279.531288][T11374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2279.583419][T11374] CPU: 1 PID: 11374 Comm: syz.3.42540 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2279.594689][T11374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2279.604578][T11374] Call Trace: [ 2279.607733][T11374] dump_stack_lvl+0x1e2/0x24b [ 2279.612233][T11374] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2279.617512][T11374] ? 0xffffffffa0002000 [ 2279.621509][T11374] ? is_bpf_text_address+0x172/0x190 [ 2279.626630][T11374] ? stack_trace_save+0x1c0/0x1c0 [ 2279.631492][T11374] dump_stack+0x15/0x17 [ 2279.635481][T11374] should_fail+0x3c6/0x510 [ 2279.639740][T11374] should_fail_usercopy+0x1a/0x20 [ 2279.644599][T11374] _copy_from_user+0x20/0xd0 [ 2279.649027][T11374] __se_sys_bpf+0x232/0x11cb0 [ 2279.653531][T11374] ? stack_trace_save+0x113/0x1c0 [ 2279.658393][T11374] ? terminate_walk+0x407/0x4f0 [ 2279.663085][T11374] ? stack_trace_snprint+0xf0/0xf0 [ 2279.668027][T11374] ? kmem_cache_free+0xa9/0x1e0 [ 2279.672711][T11374] ? kmem_cache_free+0xa9/0x1e0 [ 2279.677394][T11374] ? kasan_set_track+0x5d/0x70 [ 2279.681995][T11374] ? kasan_set_track+0x4b/0x70 [ 2279.686596][T11374] ? kasan_set_free_info+0x23/0x40 [ 2279.691543][T11374] ? ____kasan_slab_free+0x121/0x160 [ 2279.696662][T11374] ? __kasan_slab_free+0x11/0x20 [ 2279.701438][T11374] ? __x64_sys_bpf+0x90/0x90 [ 2279.705863][T11374] ? do_sys_openat2+0x5e1/0x6f0 [ 2279.710549][T11374] ? __x64_sys_openat+0x243/0x290 [ 2279.715411][T11374] ? do_syscall_64+0x34/0x70 [ 2279.719856][T11374] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2279.725740][T11374] ? _kstrtoull+0x3a0/0x4a0 [ 2279.730174][T11374] ? kstrtouint_from_user+0x20a/0x2a0 [ 2279.735382][T11374] ? kstrtol_from_user+0x310/0x310 [ 2279.740330][T11374] ? memset+0x35/0x40 [ 2279.744150][T11374] ? __fsnotify_parent+0x4b9/0x6c0 [ 2279.749095][T11374] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 2279.755779][T11374] ? proc_fail_nth_write+0x20b/0x290 [ 2279.760899][T11374] ? proc_fail_nth_read+0x210/0x210 [ 2279.765934][T11374] ? security_file_permission+0x86/0xb0 [ 2279.771313][T11374] ? rw_verify_area+0x1c3/0x360 [ 2279.776001][T11374] ? slab_free_freelist_hook+0xc0/0x190 [ 2279.781380][T11374] ? preempt_count_add+0x92/0x1a0 [ 2279.786242][T11374] ? vfs_write+0x854/0xe70 [ 2279.790496][T11374] ? kernel_write+0x3d0/0x3d0 [ 2279.795007][T11374] ? __kasan_check_write+0x14/0x20 [ 2279.799954][T11374] ? mutex_lock+0xa5/0x110 [ 2279.804204][T11374] ? mutex_trylock+0xa0/0xa0 [ 2279.808634][T11374] ? __kasan_check_write+0x14/0x20 [ 2279.813578][T11374] ? fput_many+0x160/0x1b0 [ 2279.817840][T11374] ? debug_smp_processor_id+0x17/0x20 [ 2279.823039][T11374] __x64_sys_bpf+0x7b/0x90 [ 2279.827294][T11374] do_syscall_64+0x34/0x70 [ 2279.831545][T11374] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2279.837277][T11374] RIP: 0033:0x7f265fa39b99 [ 2279.841535][T11374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2279.860970][T11374] RSP: 002b:00007f265ecbb048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2279.869212][T11374] RAX: ffffffffffffffda RBX: 00007f265fbc7fa0 RCX: 00007f265fa39b99 [ 2279.877022][T11374] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 2279.884832][T11374] RBP: 00007f265ecbb0a0 R08: 0000000000000000 R09: 0000000000000000 [ 2279.892644][T11374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2279.900557][T11374] R13: 000000000000000b R14: 00007f265fbc7fa0 R15: 00007ffd37a02f38 [ 2279.938093][T11381] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2279.991399][T11383] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2280.236201][T11400] syz.2.42550[11400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2280.236261][T11400] syz.2.42550[11400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2280.423481][T11404] device veth1_macvtap left promiscuous mode [ 2280.505398][T11406] syz.2.42550[11406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2280.505457][T11406] syz.2.42550[11406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2280.659481][T11404] device macsec0 entered promiscuous mode [ 2280.851438][T11410] FAULT_INJECTION: forcing a failure. [ 2280.851438][T11410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2280.864381][T11410] CPU: 0 PID: 11410 Comm: syz.3.42554 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2280.875548][T11410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2280.885440][T11410] Call Trace: [ 2280.888578][T11410] dump_stack_lvl+0x1e2/0x24b [ 2280.893082][T11410] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2280.898375][T11410] ? 0xffffffffa0002000 [ 2280.902367][T11410] ? is_bpf_text_address+0x172/0x190 [ 2280.907489][T11410] dump_stack+0x15/0x17 [ 2280.911477][T11410] should_fail+0x3c6/0x510 [ 2280.915735][T11410] should_fail_usercopy+0x1a/0x20 [ 2280.920603][T11410] strncpy_from_user+0x24/0x2d0 [ 2280.925283][T11410] __se_sys_bpf+0x1389/0x11cb0 [ 2280.929881][T11410] ? stack_trace_save+0x113/0x1c0 [ 2280.934739][T11410] ? terminate_walk+0x407/0x4f0 [ 2280.939435][T11410] ? stack_trace_snprint+0xf0/0xf0 [ 2280.944376][T11410] ? kmem_cache_free+0xa9/0x1e0 [ 2280.949064][T11410] ? kmem_cache_free+0xa9/0x1e0 [ 2280.953746][T11410] ? kasan_set_track+0x5d/0x70 [ 2280.958345][T11410] ? kasan_set_track+0x4b/0x70 [ 2280.962956][T11410] ? kasan_set_free_info+0x23/0x40 [ 2280.967893][T11410] ? ____kasan_slab_free+0x121/0x160 [ 2280.973016][T11410] ? __kasan_slab_free+0x11/0x20 [ 2280.977789][T11410] ? __x64_sys_bpf+0x90/0x90 [ 2280.982214][T11410] ? do_sys_openat2+0x5e1/0x6f0 [ 2280.986906][T11410] ? __x64_sys_openat+0x243/0x290 [ 2280.991761][T11410] ? do_syscall_64+0x34/0x70 [ 2280.996188][T11410] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2281.002092][T11410] ? _kstrtoull+0x3a0/0x4a0 [ 2281.006443][T11410] ? memset+0x35/0x40 [ 2281.010252][T11410] ? __fsnotify_parent+0x4b9/0x6c0 [ 2281.015198][T11410] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 2281.021802][T11410] ? proc_fail_nth_write+0x20b/0x290 [ 2281.026913][T11410] ? proc_fail_nth_read+0x210/0x210 [ 2281.031951][T11410] ? security_file_permission+0x86/0xb0 [ 2281.037335][T11410] ? rw_verify_area+0x1c3/0x360 [ 2281.042020][T11410] ? slab_free_freelist_hook+0xc0/0x190 [ 2281.047396][T11410] ? preempt_count_add+0x92/0x1a0 [ 2281.052258][T11410] ? vfs_write+0x854/0xe70 [ 2281.056515][T11410] ? kernel_write+0x3d0/0x3d0 [ 2281.061024][T11410] ? __kasan_check_write+0x14/0x20 [ 2281.065969][T11410] ? mutex_lock+0xa5/0x110 [ 2281.070224][T11410] ? mutex_trylock+0xa0/0xa0 [ 2281.074649][T11410] ? __kasan_check_write+0x14/0x20 [ 2281.079595][T11410] ? fput_many+0x160/0x1b0 [ 2281.083854][T11410] ? debug_smp_processor_id+0x17/0x20 [ 2281.089054][T11410] __x64_sys_bpf+0x7b/0x90 [ 2281.093313][T11410] do_syscall_64+0x34/0x70 [ 2281.097824][T11410] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2281.103551][T11410] RIP: 0033:0x7f265fa39b99 [ 2281.107801][T11410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2281.127242][T11410] RSP: 002b:00007f265ecbb048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2281.135486][T11410] RAX: ffffffffffffffda RBX: 00007f265fbc7fa0 RCX: 00007f265fa39b99 [ 2281.143300][T11410] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 2281.151106][T11410] RBP: 00007f265ecbb0a0 R08: 0000000000000000 R09: 0000000000000000 [ 2281.158922][T11410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2281.166732][T11410] R13: 000000000000000b R14: 00007f265fbc7fa0 R15: 00007ffd37a02f38 [ 2281.194391][T11412] device sit0 left promiscuous mode [ 2281.264075][T11423] device sit0 entered promiscuous mode [ 2284.329604][T11531] device pim6reg1 entered promiscuous mode [ 2284.459612][T11546] bpf_get_probe_write_proto: 1 callbacks suppressed [ 2284.459636][T11546] syz.2.42609[11546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2284.514048][T11546] syz.2.42609[11546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2285.284005][T11572] device veth1_macvtap left promiscuous mode [ 2285.310023][T11572] device macsec0 left promiscuous mode [ 2285.835967][T11606] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 2286.402454][T11625] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2287.539787][T11687] device syzkaller0 entered promiscuous mode [ 2290.062364][T11812] : renamed from bond_slave_0 [ 2291.744892][T11894] device syzkaller0 entered promiscuous mode [ 2293.214747][T11945] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2294.295051][T11990] syz.0.42785[11990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2294.295131][T11990] syz.0.42785[11990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2294.314488][T11990] syz.0.42785[11990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2294.327233][T11990] syz.0.42785[11990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2294.529567][T12007] bridge0: port 1(bridge_slave_0) entered blocking state [ 2294.550369][T12007] bridge0: port 1(bridge_slave_0) entered disabled state [ 2294.558483][T12007] device bridge_slave_0 entered promiscuous mode [ 2294.574505][T12007] bridge0: port 2(bridge_slave_1) entered blocking state [ 2294.582661][T12007] bridge0: port 2(bridge_slave_1) entered disabled state [ 2294.602485][T12007] device bridge_slave_1 entered promiscuous mode [ 2295.069137][ T4948] device bridge_slave_1 left promiscuous mode [ 2295.075106][ T4948] bridge0: port 2(bridge_slave_1) entered disabled state [ 2295.156033][ T4948] device O3c left promiscuous mode [ 2295.195800][ T4948] bridge0: port 1(O3c) entered disabled state [ 2295.514835][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2295.522410][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2295.536281][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2295.544444][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2295.552826][T32610] bridge0: port 1(bridge_slave_0) entered blocking state [ 2295.559738][T32610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2295.567486][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2295.576860][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2295.584965][T32610] bridge0: port 2(bridge_slave_1) entered blocking state [ 2295.591844][T32610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2295.605858][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2295.622284][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2295.630856][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2295.639609][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2295.647955][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2295.666297][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2295.674552][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2295.684638][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2295.693973][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2295.702742][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2295.710316][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2295.721374][T12007] device veth0_vlan entered promiscuous mode [ 2295.736996][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2295.745199][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2295.754897][T12007] device veth1_macvtap entered promiscuous mode [ 2295.766279][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2295.774005][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2295.782874][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2295.799369][ T7119] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2295.807608][ T7119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2296.054566][T12059] device syzkaller0 entered promiscuous mode [ 2302.566647][T12340] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2302.690780][T12347] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2302.989251][T12377] device syzkaller0 entered promiscuous mode [ 2303.163508][T12387] bridge0: port 1(bridge_slave_0) entered blocking state [ 2303.170949][T12387] bridge0: port 1(bridge_slave_0) entered disabled state [ 2303.178686][T12387] device bridge_slave_0 entered promiscuous mode [ 2303.186088][T12387] bridge0: port 2(bridge_slave_1) entered blocking state [ 2303.192919][T12387] bridge0: port 2(bridge_slave_1) entered disabled state [ 2303.200567][T12387] device bridge_slave_1 entered promiscuous mode [ 2303.447001][T12387] bridge0: port 2(bridge_slave_1) entered blocking state [ 2303.453861][T12387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2303.460977][T12387] bridge0: port 1(bridge_slave_0) entered blocking state [ 2303.467744][T12387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2303.493040][ T7119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2303.501018][ T7119] bridge0: port 1(bridge_slave_0) entered disabled state [ 2303.509821][ T7119] bridge0: port 2(bridge_slave_1) entered disabled state [ 2303.542082][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2303.552858][ T7121] bridge0: port 1(bridge_slave_0) entered blocking state [ 2303.559724][ T7121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2303.567744][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2303.576093][ T7121] bridge0: port 2(bridge_slave_1) entered blocking state [ 2303.582945][ T7121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2303.592025][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2303.604905][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2303.625235][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2303.636941][T12387] device veth0_vlan entered promiscuous mode [ 2303.645093][ T7119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2303.657934][ T7119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2303.672397][T12387] device veth1_macvtap entered promiscuous mode [ 2303.699547][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2303.707307][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2303.714626][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2303.732240][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2303.741599][ T7121] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2303.788206][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2303.827621][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2303.836477][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2303.846885][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2303.862877][T12415] device veth0_vlan left promiscuous mode [ 2303.934091][T12415] device veth0_vlan entered promiscuous mode [ 2304.120104][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2304.128466][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 2304.158619][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2304.555006][T12434] device syzkaller0 entered promiscuous mode [ 2305.128354][ T4948] device bridge_slave_1 left promiscuous mode [ 2305.134325][ T4948] bridge0: port 2(bridge_slave_1) entered disabled state [ 2305.162253][ T4948] device bridge_slave_0 left promiscuous mode [ 2305.179463][ T4948] bridge0: port 1(bridge_slave_0) entered disabled state [ 2305.204189][ T4948] device veth0_vlan left promiscuous mode [ 2305.868233][T12521] syz.4.42986[12521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2305.868291][T12521] syz.4.42986[12521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2305.921305][T12521] syz.4.42986[12521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2305.934652][T12521] syz.4.42986[12521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2306.386247][T12556] syz.2.43000[12556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2306.797100][T12556] syz.2.43000[12556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2306.908212][T12554] syz.2.43000[12554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2306.921042][T12554] syz.2.43000[12554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2307.990593][T12624] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2308.341319][T12619] device veth0_vlan left promiscuous mode [ 2308.354633][T12619] device veth0_vlan entered promiscuous mode [ 2308.526723][T12667] device wg2 entered promiscuous mode [ 2309.282108][T12700] syz.3.43059[12700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2309.282162][T12700] syz.3.43059[12700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2309.360554][T12719] device vxcan1 entered promiscuous mode [ 2309.760253][T12744] device syzkaller0 entered promiscuous mode [ 2309.905949][T12746] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2310.468544][T12768] FAULT_INJECTION: forcing a failure. [ 2310.468544][T12768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2310.505255][T12768] CPU: 0 PID: 12768 Comm: syz.0.43085 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2310.516527][T12768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2310.526416][T12768] Call Trace: [ 2310.529553][T12768] dump_stack_lvl+0x1e2/0x24b [ 2310.534058][T12768] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2310.539354][T12768] ? stack_trace_save+0x113/0x1c0 [ 2310.544219][T12768] ? stack_trace_snprint+0xf0/0xf0 [ 2310.549165][T12768] dump_stack+0x15/0x17 [ 2310.553158][T12768] should_fail+0x3c6/0x510 [ 2310.557405][T12768] should_fail_alloc_page+0x52/0x60 [ 2310.562438][T12768] __alloc_pages_nodemask+0x1b3/0xaf0 [ 2310.567644][T12768] ? __get_vm_area_node+0x156/0x470 [ 2310.572677][T12768] ? __vmalloc_node_range+0xdc/0x7c0 [ 2310.577799][T12768] ? __x64_sys_clone+0x23f/0x290 [ 2310.582579][T12768] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 2310.587960][T12768] __get_free_pages+0xe/0x30 [ 2310.592380][T12768] kasan_populate_vmalloc_pte+0x39/0x130 [ 2310.597851][T12768] ? __apply_to_page_range+0x710/0x9e0 [ 2310.603145][T12768] __apply_to_page_range+0x720/0x9e0 [ 2310.608299][T12768] ? kasan_populate_vmalloc+0x70/0x70 [ 2310.613479][T12768] ? kasan_populate_vmalloc+0x70/0x70 [ 2310.618680][T12768] apply_to_page_range+0x3b/0x50 [ 2310.623453][T12768] kasan_populate_vmalloc+0x65/0x70 [ 2310.628487][T12768] alloc_vmap_area+0x1944/0x1a90 [ 2310.633306][T12768] ? vm_map_ram+0x9d0/0x9d0 [ 2310.637602][T12768] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 2310.642984][T12768] ? __get_vm_area_node+0x116/0x470 [ 2310.648019][T12768] __get_vm_area_node+0x156/0x470 [ 2310.652889][T12768] __vmalloc_node_range+0xdc/0x7c0 [ 2310.657819][T12768] ? copy_process+0x5c8/0x3340 [ 2310.662421][T12768] ? kmem_cache_alloc+0x168/0x2e0 [ 2310.667294][T12768] dup_task_struct+0x429/0xc30 [ 2310.671880][T12768] ? copy_process+0x5c8/0x3340 [ 2310.676483][T12768] copy_process+0x5c8/0x3340 [ 2310.680910][T12768] ? proc_fail_nth_write+0x20b/0x290 [ 2310.686035][T12768] ? proc_fail_nth_read+0x210/0x210 [ 2310.691063][T12768] ? security_file_permission+0x86/0xb0 [ 2310.696445][T12768] ? rw_verify_area+0x1c3/0x360 [ 2310.701129][T12768] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2310.706073][T12768] ? vfs_write+0x854/0xe70 [ 2310.710332][T12768] kernel_clone+0x21e/0x9e0 [ 2310.714669][T12768] ? __kasan_check_write+0x14/0x20 [ 2310.719612][T12768] ? create_io_thread+0x1e0/0x1e0 [ 2310.724476][T12768] __x64_sys_clone+0x23f/0x290 [ 2310.729077][T12768] ? __do_sys_vfork+0x130/0x130 [ 2310.733764][T12768] ? debug_smp_processor_id+0x17/0x20 [ 2310.738970][T12768] do_syscall_64+0x34/0x70 [ 2310.743226][T12768] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2310.748947][T12768] RIP: 0033:0x7f78ccb4ab99 [ 2310.753202][T12768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2310.772642][T12768] RSP: 002b:00007f78cbdcbff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2310.780887][T12768] RAX: ffffffffffffffda RBX: 00007f78cccd8fa0 RCX: 00007f78ccb4ab99 [ 2310.788696][T12768] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c000000 [ 2310.796511][T12768] RBP: 00007f78cbdcc0a0 R08: 0000000000000000 R09: 0000000000000000 [ 2310.804453][T12768] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2310.812255][T12768] R13: 000000000000000b R14: 00007f78cccd8fa0 R15: 00007ffd5b972cf8 [ 2310.829901][T12768] syz.0.43085: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 2310.843765][T12768] CPU: 0 PID: 12768 Comm: syz.0.43085 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2310.855015][T12768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2310.864902][T12768] Call Trace: [ 2310.868050][T12768] dump_stack_lvl+0x1e2/0x24b [ 2310.872565][T12768] ? wake_up_klogd+0xb8/0xf0 [ 2310.876973][T12768] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2310.882272][T12768] ? pr_cont_kernfs_name+0xf0/0x100 [ 2310.887307][T12768] dump_stack+0x15/0x17 [ 2310.891296][T12768] warn_alloc+0x21a/0x390 [ 2310.895460][T12768] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 2310.900840][T12768] ? __get_vm_area_node+0x16c/0x470 [ 2310.905883][T12768] __vmalloc_node_range+0x287/0x7c0 [ 2310.910907][T12768] ? kmem_cache_alloc+0x168/0x2e0 [ 2310.915764][T12768] dup_task_struct+0x429/0xc30 [ 2310.920362][T12768] ? copy_process+0x5c8/0x3340 [ 2310.924966][T12768] copy_process+0x5c8/0x3340 [ 2310.929394][T12768] ? proc_fail_nth_write+0x20b/0x290 [ 2310.934513][T12768] ? proc_fail_nth_read+0x210/0x210 [ 2310.939546][T12768] ? security_file_permission+0x86/0xb0 [ 2310.944956][T12768] ? rw_verify_area+0x1c3/0x360 [ 2310.949628][T12768] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2310.954557][T12768] ? vfs_write+0x854/0xe70 [ 2310.958818][T12768] kernel_clone+0x21e/0x9e0 [ 2310.963158][T12768] ? __kasan_check_write+0x14/0x20 [ 2310.968101][T12768] ? create_io_thread+0x1e0/0x1e0 [ 2310.972965][T12768] __x64_sys_clone+0x23f/0x290 [ 2310.977561][T12768] ? __do_sys_vfork+0x130/0x130 [ 2310.982265][T12768] ? debug_smp_processor_id+0x17/0x20 [ 2310.987459][T12768] do_syscall_64+0x34/0x70 [ 2310.991711][T12768] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2310.997436][T12768] RIP: 0033:0x7f78ccb4ab99 [ 2311.001700][T12768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2311.021133][T12768] RSP: 002b:00007f78cbdcbff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2311.029375][T12768] RAX: ffffffffffffffda RBX: 00007f78cccd8fa0 RCX: 00007f78ccb4ab99 [ 2311.037184][T12768] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c000000 [ 2311.044994][T12768] RBP: 00007f78cbdcc0a0 R08: 0000000000000000 R09: 0000000000000000 [ 2311.052805][T12768] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2311.060636][T12768] R13: 000000000000000b R14: 00007f78cccd8fa0 R15: 00007ffd5b972cf8 [ 2311.112437][T12768] Mem-Info: [ 2311.117219][T12768] active_anon:87 inactive_anon:22281 isolated_anon:0 [ 2311.117219][T12768] active_file:32326 inactive_file:3326 isolated_file:0 [ 2311.117219][T12768] unevictable:0 dirty:237 writeback:0 [ 2311.117219][T12768] slab_reclaimable:13865 slab_unreclaimable:90287 [ 2311.117219][T12768] mapped:17327 shmem:141 pagetables:515 bounce:0 [ 2311.117219][T12768] free:1541658 free_pcp:894 free_cma:0 [ 2311.163645][T12768] Node 0 active_anon:348kB inactive_anon:89124kB active_file:129304kB inactive_file:13304kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:69308kB dirty:948kB writeback:0kB shmem:564kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5408kB all_unreclaimable? no [ 2311.199863][T12768] DMA32 free:2983352kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984788kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1436kB local_pcp:52kB free_cma:0kB [ 2311.230478][T12768] lowmem_reserve[]: 0 3941 3941 [ 2311.249085][T12768] Normal free:3182808kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:348kB inactive_anon:89124kB active_file:129304kB inactive_file:13604kB unevictable:0kB writepending:1096kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2060kB bounce:0kB free_pcp:1792kB local_pcp:836kB free_cma:0kB [ 2311.297828][T12768] lowmem_reserve[]: 0 0 0 [ 2311.302286][T12768] DMA32: 6*4kB (UM) 4*8kB (M) 4*16kB (M) 6*32kB (UM) 8*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2983352kB [ 2311.330904][T12768] Normal: 1618*4kB (UME) 2745*8kB (UME) 1873*16kB (UME) 634*32kB (UME) 1425*64kB (UME) 1218*128kB (UME) 766*256kB (UME) 516*512kB (UM) 372*1024kB (UM) 200*2048kB (UM) 392*4096kB (UM) = 3182240kB [ 2311.352939][T12768] 35793 total pagecache pages [ 2311.363031][T12768] 0 pages in swap cache [ 2311.373971][T12768] Swap cache stats: add 0, delete 0, find 0/0 [ 2311.380739][T12768] Free swap = 124996kB [ 2311.384746][T12768] Total swap = 124996kB [ 2311.390087][T12768] 2097051 pages RAM [ 2311.393718][T12768] 0 pages HighMem/MovableOnly [ 2311.405777][T12768] 341890 pages reserved [ 2311.409756][T12768] 0 pages cma reserved [ 2312.992639][T12923] : renamed from veth0_vlan [ 2314.366953][T13014] device syzkaller0 entered promiscuous mode [ 2315.825288][T13068] device syzkaller0 entered promiscuous mode [ 2316.202976][T13077] device syzkaller0 entered promiscuous mode [ 2317.792851][T13145] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2319.725203][T13201] device syzkaller0 entered promiscuous mode [ 2320.831117][T13235] bpf_get_probe_write_proto: 2 callbacks suppressed [ 2320.831127][T13235] syz.2.43266[13235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2320.842100][T13235] syz.2.43266[13235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2321.485217][T13255] device syzkaller0 entered promiscuous mode [ 2324.465219][T13462] device pim6reg1 entered promiscuous mode [ 2325.163246][T13467] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2325.469407][T13497] bridge0: port 3(veth0_to_batadv) entered blocking state [ 2325.477483][T13497] bridge0: port 3(veth0_to_batadv) entered disabled state [ 2325.488234][T13497] device veth0_to_batadv entered promiscuous mode [ 2325.494618][T13497] bridge0: port 3(veth0_to_batadv) entered blocking state [ 2325.501587][T13497] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 2325.511415][T13499] syz.0.43364[13499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2325.511474][T13499] syz.0.43364[13499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2325.526916][T13501] device veth0_to_batadv left promiscuous mode [ 2325.554143][T13501] bridge0: port 3(veth0_to_batadv) entered disabled state [ 2327.294829][T13545] device sit0 entered promiscuous mode [ 2328.063362][T13568] device vxcan1 entered promiscuous mode [ 2329.903483][T13659] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2330.892010][T13712] device syzkaller0 entered promiscuous mode [ 2330.968978][T13726] device macsec0 entered promiscuous mode [ 2331.196918][T13748] device syzkaller0 entered promiscuous mode [ 2332.507017][T13845] device veth0_vlan left promiscuous mode [ 2332.637814][T13845] device veth0_vlan entered promiscuous mode [ 2337.959488][T14097] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 2339.045542][T14120] bridge0: port 1(bridge_slave_0) entered blocking state [ 2339.053169][T14120] bridge0: port 1(bridge_slave_0) entered disabled state [ 2339.061494][T14120] device bridge_slave_0 entered promiscuous mode [ 2339.069385][T14120] bridge0: port 2(bridge_slave_1) entered blocking state [ 2339.078225][T14120] bridge0: port 2(bridge_slave_1) entered disabled state [ 2339.087867][T14120] device bridge_slave_1 entered promiscuous mode [ 2339.163516][T14120] bridge0: port 2(bridge_slave_1) entered blocking state [ 2339.170411][T14120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2339.177514][T14120] bridge0: port 1(bridge_slave_0) entered blocking state [ 2339.184252][T14120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2339.260691][ T7112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2339.268934][ T7112] bridge0: port 1(bridge_slave_0) entered disabled state [ 2339.278963][ T7112] bridge0: port 2(bridge_slave_1) entered disabled state [ 2339.338284][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2339.403867][ T7113] bridge0: port 1(bridge_slave_0) entered blocking state [ 2339.410744][ T7113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2339.545769][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2339.553847][ T7113] bridge0: port 2(bridge_slave_1) entered blocking state [ 2339.560760][ T7113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2339.568378][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2339.588021][ T7114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2339.722484][ T7114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2339.808822][T14120] device veth0_vlan entered promiscuous mode [ 2340.432319][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2340.441143][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2340.450310][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2340.476136][T14155] device syzkaller0 entered promiscuous mode [ 2340.504203][T14120] device veth1_macvtap entered promiscuous mode [ 2340.511470][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2340.519823][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2340.527848][T32610] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2340.547665][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2340.556524][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2340.564644][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2340.573377][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2340.686412][ T2193] device bridge_slave_1 left promiscuous mode [ 2340.692455][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2340.699877][ T2193] device bridge_slave_0 left promiscuous mode [ 2340.705900][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2340.871474][T14179] device syzkaller0 entered promiscuous mode [ 2341.873740][T14248] FAULT_INJECTION: forcing a failure. [ 2341.873740][T14248] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2341.886765][T14248] CPU: 1 PID: 14248 Comm: syz.3.43649 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2341.898016][T14248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2341.907914][T14248] Call Trace: [ 2341.911048][T14248] dump_stack_lvl+0x1e2/0x24b [ 2341.915551][T14248] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2341.920845][T14248] dump_stack+0x15/0x17 [ 2341.924834][T14248] should_fail+0x3c6/0x510 [ 2341.929175][T14248] should_fail_usercopy+0x1a/0x20 [ 2341.934033][T14248] _copy_from_user+0x20/0xd0 [ 2341.938462][T14248] __se_sys_bpf+0x232/0x11cb0 [ 2341.942976][T14248] ? stack_trace_save+0x113/0x1c0 [ 2341.947985][T14248] ? __bad_area_nosemaphore+0xcd/0x440 [ 2341.953260][T14248] ? bad_area_nosemaphore+0x2d/0x40 [ 2341.958299][T14248] ? exc_page_fault+0x33d/0x5b0 [ 2341.962981][T14248] ? __x64_sys_bpf+0x90/0x90 [ 2341.967403][T14248] ? asm_exc_page_fault+0x1e/0x30 [ 2341.972266][T14248] ? _kstrtoull+0x3a0/0x4a0 [ 2341.976603][T14248] ? kstrtouint_from_user+0x20a/0x2a0 [ 2341.981810][T14248] ? strncpy_from_user+0x2b6/0x2d0 [ 2341.986758][T14248] ? kstrtol_from_user+0x310/0x310 [ 2341.991705][T14248] ? memset+0x35/0x40 [ 2341.995523][T14248] ? __fsnotify_parent+0x4b9/0x6c0 [ 2342.000472][T14248] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 2342.007067][T14248] ? proc_fail_nth_write+0x20b/0x290 [ 2342.012201][T14248] ? proc_fail_nth_read+0x210/0x210 [ 2342.017221][T14248] ? security_file_permission+0x86/0xb0 [ 2342.022602][T14248] ? rw_verify_area+0x1c3/0x360 [ 2342.027291][T14248] ? preempt_count_add+0x92/0x1a0 [ 2342.032149][T14248] ? vfs_write+0x854/0xe70 [ 2342.036421][T14248] ? kernel_write+0x3d0/0x3d0 [ 2342.040928][T14248] ? __kasan_check_write+0x14/0x20 [ 2342.045869][T14248] ? mutex_lock+0xa5/0x110 [ 2342.050146][T14248] ? mutex_trylock+0xa0/0xa0 [ 2342.054553][T14248] ? __kasan_check_write+0x14/0x20 [ 2342.059495][T14248] ? fput_many+0x160/0x1b0 [ 2342.063765][T14248] ? debug_smp_processor_id+0x17/0x20 [ 2342.069134][T14248] __x64_sys_bpf+0x7b/0x90 [ 2342.073381][T14248] do_syscall_64+0x34/0x70 [ 2342.077634][T14248] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2342.083359][T14248] RIP: 0033:0x7fbdf4568b99 [ 2342.087612][T14248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2342.107049][T14248] RSP: 002b:00007fbdf37ea048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2342.115291][T14248] RAX: ffffffffffffffda RBX: 00007fbdf46f6fa0 RCX: 00007fbdf4568b99 [ 2342.123102][T14248] RDX: 0000000000000020 RSI: 00000000200004c0 RDI: 0000000000000002 [ 2342.130915][T14248] RBP: 00007fbdf37ea0a0 R08: 0000000000000000 R09: 0000000000000000 [ 2342.138725][T14248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2342.146536][T14248] R13: 000000000000000b R14: 00007fbdf46f6fa0 R15: 00007ffc38be68f8 [ 2343.155963][T14288] FAULT_INJECTION: forcing a failure. [ 2343.155963][T14288] name failslab, interval 1, probability 0, space 0, times 0 [ 2343.175226][T14288] CPU: 0 PID: 14288 Comm: syz.3.43664 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2343.186499][T14288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2343.196480][T14288] Call Trace: [ 2343.199622][T14288] dump_stack_lvl+0x1e2/0x24b [ 2343.204115][T14288] ? panic+0x812/0x812 [ 2343.208024][T14288] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2343.213321][T14288] dump_stack+0x15/0x17 [ 2343.217306][T14288] should_fail+0x3c6/0x510 [ 2343.221566][T14288] ? __se_sys_bpf+0x4beb/0x11cb0 [ 2343.226333][T14288] __should_failslab+0xa4/0xe0 [ 2343.230968][T14288] should_failslab+0x9/0x20 [ 2343.235273][T14288] __kmalloc_track_caller+0x5f/0x320 [ 2343.240396][T14288] memdup_user+0x25/0xb0 [ 2343.244470][T14288] __se_sys_bpf+0x4beb/0x11cb0 [ 2343.249094][T14288] ? check_preempt_wakeup+0x6b3/0xbb0 [ 2343.254278][T14288] ? __x64_sys_bpf+0x90/0x90 [ 2343.258708][T14288] ? _kstrtoull+0x3a0/0x4a0 [ 2343.263042][T14288] ? kstrtouint_from_user+0x20a/0x2a0 [ 2343.268254][T14288] ? kstrtol_from_user+0x310/0x310 [ 2343.273206][T14288] ? memset+0x35/0x40 [ 2343.277018][T14288] ? __fsnotify_parent+0x4b9/0x6c0 [ 2343.281966][T14288] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 2343.288564][T14288] ? proc_fail_nth_write+0x20b/0x290 [ 2343.293682][T14288] ? proc_fail_nth_read+0x210/0x210 [ 2343.298718][T14288] ? security_file_permission+0x86/0xb0 [ 2343.304096][T14288] ? rw_verify_area+0x1c3/0x360 [ 2343.308784][T14288] ? preempt_count_add+0x92/0x1a0 [ 2343.313656][T14288] ? vfs_write+0x854/0xe70 [ 2343.317987][T14288] ? __remove_hrtimer+0x3c0/0x3c0 [ 2343.322844][T14288] ? __hrtimer_run_queues+0x9ea/0xa50 [ 2343.328070][T14288] ? kernel_write+0x3d0/0x3d0 [ 2343.332582][T14288] ? __kasan_check_write+0x14/0x20 [ 2343.337624][T14288] ? mutex_lock+0xa5/0x110 [ 2343.341873][T14288] ? mutex_trylock+0xa0/0xa0 [ 2343.346302][T14288] ? __kasan_check_write+0x14/0x20 [ 2343.351241][T14288] ? fput_many+0x160/0x1b0 [ 2343.355498][T14288] ? debug_smp_processor_id+0x17/0x20 [ 2343.360705][T14288] __x64_sys_bpf+0x7b/0x90 [ 2343.364954][T14288] do_syscall_64+0x34/0x70 [ 2343.369210][T14288] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2343.374932][T14288] RIP: 0033:0x7fbdf4568b99 [ 2343.379190][T14288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2343.398631][T14288] RSP: 002b:00007fbdf37ea048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2343.406871][T14288] RAX: ffffffffffffffda RBX: 00007fbdf46f6fa0 RCX: 00007fbdf4568b99 [ 2343.414681][T14288] RDX: 0000000000000020 RSI: 00000000200004c0 RDI: 0000000000000002 [ 2343.422496][T14288] RBP: 00007fbdf37ea0a0 R08: 0000000000000000 R09: 0000000000000000 [ 2343.430305][T14288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2343.438118][T14288] R13: 000000000000000b R14: 00007fbdf46f6fa0 R15: 00007ffc38be68f8 [ 2343.473564][T14303] syz.3.43670[14303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2343.473620][T14303] syz.3.43670[14303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2343.806790][T14330] FAULT_INJECTION: forcing a failure. [ 2343.806790][T14330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2343.833476][T14330] CPU: 1 PID: 14330 Comm: syz.4.43682 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2343.844733][T14330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2343.854622][T14330] Call Trace: [ 2343.857761][T14330] dump_stack_lvl+0x1e2/0x24b [ 2343.862265][T14330] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2343.867556][T14330] ? ex_handler_uaccess+0x3e/0xc0 [ 2343.872417][T14330] ? fixup_exception+0x94/0xd0 [ 2343.877020][T14330] dump_stack+0x15/0x17 [ 2343.881010][T14330] should_fail+0x3c6/0x510 [ 2343.885268][T14330] should_fail_usercopy+0x1a/0x20 [ 2343.890145][T14330] _copy_from_user+0x20/0xd0 [ 2343.894568][T14330] memdup_user+0x5e/0xb0 [ 2343.898638][T14330] __se_sys_bpf+0x4beb/0x11cb0 [ 2343.903232][T14330] ? __bad_area_nosemaphore+0xcd/0x440 [ 2343.908527][T14330] ? bad_area_nosemaphore+0x2d/0x40 [ 2343.913558][T14330] ? exc_page_fault+0x33d/0x5b0 [ 2343.918244][T14330] ? __x64_sys_bpf+0x90/0x90 [ 2343.922671][T14330] ? asm_exc_page_fault+0x1e/0x30 [ 2343.927533][T14330] ? _kstrtoull+0x3a0/0x4a0 [ 2343.931871][T14330] ? kstrtouint_from_user+0x20a/0x2a0 [ 2343.937077][T14330] ? strncpy_from_user+0x2b6/0x2d0 [ 2343.942025][T14330] ? kstrtol_from_user+0x310/0x310 [ 2343.946976][T14330] ? memset+0x35/0x40 [ 2343.950792][T14330] ? __fsnotify_parent+0x4b9/0x6c0 [ 2343.955739][T14330] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 2343.962333][T14330] ? proc_fail_nth_write+0x20b/0x290 [ 2343.967454][T14330] ? proc_fail_nth_read+0x210/0x210 [ 2343.972489][T14330] ? security_file_permission+0x86/0xb0 [ 2343.977871][T14330] ? rw_verify_area+0x1c3/0x360 [ 2343.982556][T14330] ? preempt_count_add+0x92/0x1a0 [ 2343.987418][T14330] ? vfs_write+0x854/0xe70 [ 2343.991671][T14330] ? kernel_write+0x3d0/0x3d0 [ 2343.996270][T14330] ? __kasan_check_write+0x14/0x20 [ 2344.001215][T14330] ? mutex_lock+0xa5/0x110 [ 2344.005468][T14330] ? mutex_trylock+0xa0/0xa0 [ 2344.009990][T14330] ? __kasan_check_write+0x14/0x20 [ 2344.014930][T14330] ? fput_many+0x160/0x1b0 [ 2344.019222][T14330] ? debug_smp_processor_id+0x17/0x20 [ 2344.024397][T14330] __x64_sys_bpf+0x7b/0x90 [ 2344.028651][T14330] do_syscall_64+0x34/0x70 [ 2344.032902][T14330] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2344.038625][T14330] RIP: 0033:0x7ff1be6afb99 [ 2344.042879][T14330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2344.062316][T14330] RSP: 002b:00007ff1bd931048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2344.070562][T14330] RAX: ffffffffffffffda RBX: 00007ff1be83dfa0 RCX: 00007ff1be6afb99 [ 2344.078371][T14330] RDX: 0000000000000020 RSI: 00000000200004c0 RDI: 0000000000000002 [ 2344.086183][T14330] RBP: 00007ff1bd9310a0 R08: 0000000000000000 R09: 0000000000000000 [ 2344.094009][T14330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2344.101815][T14330] R13: 000000000000000b R14: 00007ff1be83dfa0 R15: 00007ffddf5b7ac8 [ 2345.373153][T14380] FAULT_INJECTION: forcing a failure. [ 2345.373153][T14380] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2345.397648][T14380] CPU: 0 PID: 14380 Comm: syz.3.43701 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2345.408906][T14380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2345.418886][T14380] Call Trace: [ 2345.422026][T14380] dump_stack_lvl+0x1e2/0x24b [ 2345.426540][T14380] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2345.431825][T14380] ? __kasan_slab_alloc+0x63/0xe0 [ 2345.436683][T14380] ? avc_has_perm+0x14d/0x400 [ 2345.441200][T14380] dump_stack+0x15/0x17 [ 2345.445189][T14380] should_fail+0x3c6/0x510 [ 2345.449451][T14380] should_fail_alloc_page+0x52/0x60 [ 2345.454480][T14380] __alloc_pages_nodemask+0x1b3/0xaf0 [ 2345.459687][T14380] ? strncpy_from_user+0x209/0x2d0 [ 2345.464638][T14380] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 2345.470014][T14380] ? fixup_exception+0x94/0xd0 [ 2345.474614][T14380] kmalloc_order+0x4c/0x170 [ 2345.478958][T14380] kmalloc_order_trace+0x18/0x90 [ 2345.483741][T14380] __kmalloc+0x1f1/0x330 [ 2345.487807][T14380] __se_sys_bpf+0x75e6/0x11cb0 [ 2345.492409][T14380] ? bad_area_nosemaphore+0x2d/0x40 [ 2345.497440][T14380] ? exc_page_fault+0x33d/0x5b0 [ 2345.502126][T14380] ? __x64_sys_bpf+0x90/0x90 [ 2345.506554][T14380] ? _kstrtoull+0x3a0/0x4a0 [ 2345.510895][T14380] ? kstrtouint_from_user+0x20a/0x2a0 [ 2345.516101][T14380] ? kstrtol_from_user+0x310/0x310 [ 2345.521049][T14380] ? memset+0x35/0x40 [ 2345.524872][T14380] ? memset+0x35/0x40 [ 2345.528715][T14380] ? __fsnotify_parent+0x4b9/0x6c0 [ 2345.533633][T14380] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 2345.540226][T14380] ? proc_fail_nth_write+0x20b/0x290 [ 2345.545350][T14380] ? proc_fail_nth_read+0x210/0x210 [ 2345.550383][T14380] ? security_file_permission+0x86/0xb0 [ 2345.555764][T14380] ? rw_verify_area+0x1c3/0x360 [ 2345.560450][T14380] ? preempt_count_add+0x92/0x1a0 [ 2345.565309][T14380] ? vfs_write+0x854/0xe70 [ 2345.569562][T14380] ? kernel_write+0x3d0/0x3d0 [ 2345.574074][T14380] ? __kasan_check_write+0x14/0x20 [ 2345.579020][T14380] ? mutex_lock+0xa5/0x110 [ 2345.583273][T14380] ? mutex_trylock+0xa0/0xa0 [ 2345.587702][T14380] ? __kasan_check_write+0x14/0x20 [ 2345.592644][T14380] ? fput_many+0x160/0x1b0 [ 2345.596911][T14380] ? debug_smp_processor_id+0x17/0x20 [ 2345.602110][T14380] __x64_sys_bpf+0x7b/0x90 [ 2345.606366][T14380] do_syscall_64+0x34/0x70 [ 2345.610616][T14380] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2345.616339][T14380] RIP: 0033:0x7fbdf4568b99 [ 2345.620594][T14380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2345.640209][T14380] RSP: 002b:00007fbdf37ea048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2345.648449][T14380] RAX: ffffffffffffffda RBX: 00007fbdf46f6fa0 RCX: 00007fbdf4568b99 [ 2345.656257][T14380] RDX: 0000000000000020 RSI: 00000000200004c0 RDI: 0000000000000002 [ 2345.664066][T14380] RBP: 00007fbdf37ea0a0 R08: 0000000000000000 R09: 0000000000000000 [ 2345.671878][T14380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2345.679691][T14380] R13: 000000000000000b R14: 00007fbdf46f6fa0 R15: 00007ffc38be68f8 [ 2347.546338][T14419] FAULT_INJECTION: forcing a failure. [ 2347.546338][T14419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2347.735722][T14419] CPU: 1 PID: 14419 Comm: syz.1.43716 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2347.746989][T14419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2347.756879][T14419] Call Trace: [ 2347.760018][T14419] dump_stack_lvl+0x1e2/0x24b [ 2347.764524][T14419] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2347.769825][T14419] ? kasan_poison+0x5d/0x70 [ 2347.774159][T14419] ? __kasan_kmalloc_large+0xad/0xc0 [ 2347.779281][T14419] dump_stack+0x15/0x17 [ 2347.783264][T14419] should_fail+0x3c6/0x510 [ 2347.787523][T14419] should_fail_usercopy+0x1a/0x20 [ 2347.792381][T14419] _copy_from_user+0x20/0xd0 [ 2347.796817][T14419] __se_sys_bpf+0x761c/0x11cb0 [ 2347.801408][T14419] ? stack_trace_snprint+0xf0/0xf0 [ 2347.806358][T14419] ? kmem_cache_free+0xa9/0x1e0 [ 2347.811047][T14419] ? kmem_cache_free+0xa9/0x1e0 [ 2347.815727][T14419] ? kasan_set_track+0x5d/0x70 [ 2347.820325][T14419] ? kasan_set_track+0x4b/0x70 [ 2347.824924][T14419] ? kasan_set_free_info+0x23/0x40 [ 2347.829874][T14419] ? ____kasan_slab_free+0x121/0x160 [ 2347.834994][T14419] ? __kasan_slab_free+0x11/0x20 [ 2347.839768][T14419] ? __x64_sys_bpf+0x90/0x90 [ 2347.844192][T14419] ? do_sys_openat2+0x5e1/0x6f0 [ 2347.848879][T14419] ? __x64_sys_openat+0x243/0x290 [ 2347.853737][T14419] ? do_syscall_64+0x34/0x70 [ 2347.858176][T14419] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2347.864085][T14419] ? _kstrtoull+0x3a0/0x4a0 [ 2347.868416][T14419] ? kstrtouint_from_user+0x20a/0x2a0 [ 2347.873706][T14419] ? kstrtol_from_user+0x310/0x310 [ 2347.878657][T14419] ? memset+0x35/0x40 [ 2347.882482][T14419] ? __fsnotify_parent+0x4b9/0x6c0 [ 2347.887425][T14419] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 2347.894014][T14419] ? proc_fail_nth_write+0x20b/0x290 [ 2347.899134][T14419] ? proc_fail_nth_read+0x210/0x210 [ 2347.904168][T14419] ? security_file_permission+0x86/0xb0 [ 2347.909547][T14419] ? rw_verify_area+0x1c3/0x360 [ 2347.914246][T14419] ? slab_free_freelist_hook+0xc0/0x190 [ 2347.919649][T14419] ? preempt_count_add+0x92/0x1a0 [ 2347.924595][T14419] ? vfs_write+0x854/0xe70 [ 2347.928848][T14419] ? kernel_write+0x3d0/0x3d0 [ 2347.933357][T14419] ? __kasan_check_write+0x14/0x20 [ 2347.938407][T14419] ? mutex_lock+0xa5/0x110 [ 2347.942831][T14419] ? mutex_trylock+0xa0/0xa0 [ 2347.947255][T14419] ? __kasan_check_write+0x14/0x20 [ 2347.952200][T14419] ? fput_many+0x160/0x1b0 [ 2347.956459][T14419] ? debug_smp_processor_id+0x17/0x20 [ 2347.961660][T14419] __x64_sys_bpf+0x7b/0x90 [ 2347.965920][T14419] do_syscall_64+0x34/0x70 [ 2347.970165][T14419] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2347.975893][T14419] RIP: 0033:0x7f9898abbb99 [ 2347.980144][T14419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2348.000108][T14419] RSP: 002b:00007f9897d3d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2348.008348][T14419] RAX: ffffffffffffffda RBX: 00007f9898c49fa0 RCX: 00007f9898abbb99 [ 2348.016168][T14419] RDX: 0000000000000020 RSI: 00000000200004c0 RDI: 0000000000000002 [ 2348.023973][T14419] RBP: 00007f9897d3d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 2348.031782][T14419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2348.039593][T14419] R13: 000000000000000b R14: 00007f9898c49fa0 R15: 00007fff273f4858 [ 2349.255162][T14463] FAULT_INJECTION: forcing a failure. [ 2349.255162][T14463] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2349.268149][T14463] CPU: 0 PID: 14463 Comm: syz.2.43730 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 2349.279393][T14463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 2349.289291][T14463] Call Trace: [ 2349.292423][T14463] dump_stack_lvl+0x1e2/0x24b [ 2349.296936][T14463] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2349.302232][T14463] dump_stack+0x15/0x17 [ 2349.306213][T14463] should_fail+0x3c6/0x510 [ 2349.310471][T14463] should_fail_usercopy+0x1a/0x20 [ 2349.315328][T14463] _copy_to_user+0x20/0x90 [ 2349.319585][T14463] simple_read_from_buffer+0xc7/0x150 [ 2349.324788][T14463] proc_fail_nth_read+0x1a3/0x210 [ 2349.329650][T14463] ? security_file_permission+0x7b/0xb0 [ 2349.335029][T14463] ? proc_fault_inject_write+0x390/0x390 [ 2349.340499][T14463] ? security_file_permission+0x86/0xb0 [ 2349.345880][T14463] ? rw_verify_area+0x1c3/0x360 [ 2349.350563][T14463] ? proc_fault_inject_write+0x390/0x390 [ 2349.356041][T14463] vfs_read+0x204/0xbb0 [ 2349.360026][T14463] ? kernel_read+0x70/0x70 [ 2349.364278][T14463] ? __kasan_check_write+0x14/0x20 [ 2349.369372][T14463] ? mutex_lock+0xa5/0x110 [ 2349.373593][T14463] ? mutex_trylock+0xa0/0xa0 [ 2349.378027][T14463] ? __fdget_pos+0x2e7/0x3a0 [ 2349.382448][T14463] ? ksys_read+0x77/0x2c0 [ 2349.386618][T14463] ksys_read+0x199/0x2c0 [ 2349.390696][T14463] ? vfs_write+0xe70/0xe70 [ 2349.394947][T14463] ? debug_smp_processor_id+0x17/0x20 [ 2349.400156][T14463] __x64_sys_read+0x7b/0x90 [ 2349.404493][T14463] do_syscall_64+0x34/0x70 [ 2349.408760][T14463] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2349.414476][T14463] RIP: 0033:0x7ff1bd20c67c [ 2349.418729][T14463] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 2349.438167][T14463] RSP: 002b:00007ff1bc48f040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2349.446415][T14463] RAX: ffffffffffffffda RBX: 00007ff1bd39bfa0 RCX: 00007ff1bd20c67c [ 2349.454221][T14463] RDX: 000000000000000f RSI: 00007ff1bc48f0b0 RDI: 0000000000000004 [ 2349.462036][T14463] RBP: 00007ff1bc48f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 2349.469846][T14463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2349.477655][T14463] R13: 000000000000000b R14: 00007ff1bd39bfa0 R15: 00007ffc7e977778 [ 2349.819734][T14475] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2352.246212][T14588] device syzkaller0 entered promiscuous mode [ 2352.266979][T14588] syz.3.43783[14588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2352.267028][T14588] syz.3.43783[14588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2353.653491][T14690] : renamed from vlan0 [ 2354.438753][T14729] Y4`Ҙ: renamed from lo [ 2354.901288][T14763] syz.1.43850[14763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2354.901335][T14763] syz.1.43850[14763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2359.718811][T15015] syz.4.43962[15015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2359.833699][T15015] syz.4.43962[15015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2361.456663][T15060] device syzkaller0 entered promiscuous mode [ 2361.979663][T15068] device pim6reg1 entered promiscuous mode [ 2362.133136][T15072] syz.2.43986[15072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2362.133440][T15072] syz.2.43986[15072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2370.239687][T15269] device bridge0 entered promiscuous mode [ 2370.817109][T15284] device veth0_vlan left promiscuous mode [ 2370.996892][T15284] device veth0_vlan entered promiscuous mode [ 2371.155576][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2371.164117][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 2371.191989][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2371.488419][T15279] bridge0: port 1(bridge_slave_0) entered blocking state [ 2371.505205][T15279] bridge0: port 1(bridge_slave_0) entered disabled state [ 2371.631672][T15279] device bridge_slave_0 entered promiscuous mode [ 2371.757626][T15279] bridge0: port 2(bridge_slave_1) entered blocking state [ 2371.795578][T15279] bridge0: port 2(bridge_slave_1) entered disabled state [ 2371.803201][T15279] device bridge_slave_1 entered promiscuous mode [ 2371.906056][T15297] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 2372.091485][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2372.100691][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2372.117382][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2372.125502][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2372.134348][T25873] bridge0: port 1(bridge_slave_0) entered blocking state [ 2372.141226][T25873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2372.149403][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2372.158661][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2372.167661][T25873] bridge0: port 2(bridge_slave_1) entered blocking state [ 2372.174524][T25873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2372.195555][T15279] device veth0_vlan entered promiscuous mode [ 2372.202078][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2372.215156][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2372.223989][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2372.231325][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2372.239577][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2372.247233][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2372.255063][T32609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2374.070424][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2374.106705][T25873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2374.125734][T15279] device veth1_macvtap entered promiscuous mode [ 2374.858989][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2374.878261][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2374.981478][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2374.992396][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2375.011593][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2377.576733][T15436] bridge0: port 1(bridge_slave_0) entered disabled state [ 2378.843547][T15481] bridge0: port 1(bridge_slave_0) entered blocking state [ 2378.850702][T15481] bridge0: port 1(bridge_slave_0) entered disabled state [ 2378.859113][T15481] device bridge_slave_0 entered promiscuous mode [ 2378.868570][T15481] bridge0: port 2(bridge_slave_1) entered blocking state [ 2378.880564][T15481] bridge0: port 2(bridge_slave_1) entered disabled state [ 2378.894261][T15481] device bridge_slave_1 entered promiscuous mode [ 2379.513683][ T2193] device bridge_slave_1 left promiscuous mode [ 2379.539864][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2379.613508][ T2193] device bridge_slave_0 left promiscuous mode [ 2379.640902][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2379.658083][ T2193] device veth0_vlan left promiscuous mode [ 2380.133749][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2380.142161][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2380.339437][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2380.350188][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2380.358566][ T7113] bridge0: port 1(bridge_slave_0) entered blocking state [ 2380.365394][ T7113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2380.378220][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2380.388507][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2380.402811][ T7113] bridge0: port 2(bridge_slave_1) entered blocking state [ 2380.409765][ T7113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2380.417836][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2380.425961][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2380.433916][ T7113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2380.457936][T15554] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2380.474603][T15481] device veth0_vlan entered promiscuous mode [ 2380.482684][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2380.492142][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2380.500066][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2380.510860][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2380.695090][T15481] device veth1_macvtap entered promiscuous mode [ 2380.799757][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2380.808038][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2380.816712][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2380.922746][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2380.931035][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2380.942686][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2380.962689][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2381.736940][T15613] device syzkaller0 entered promiscuous mode [ 2381.744766][ T2193] device bridge_slave_1 left promiscuous mode [ 2381.751197][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2381.758686][ T2193] device bridge_slave_0 left promiscuous mode [ 2381.764621][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2381.772434][ T2193] device veth1_macvtap left promiscuous mode [ 2381.778271][ T2193] device veth0_vlan left promiscuous mode [ 2382.187953][T15632] bridge0: port 1(bridge_slave_0) entered blocking state [ 2382.194863][T15632] bridge0: port 1(bridge_slave_0) entered disabled state [ 2382.202394][T15632] device bridge_slave_0 entered promiscuous mode [ 2382.209422][T15632] bridge0: port 2(bridge_slave_1) entered blocking state [ 2382.217028][T15632] bridge0: port 2(bridge_slave_1) entered disabled state [ 2382.224566][T15632] device bridge_slave_1 entered promiscuous mode [ 2382.272128][T15632] bridge0: port 2(bridge_slave_1) entered blocking state [ 2382.278981][T15632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2382.286113][T15632] bridge0: port 1(bridge_slave_0) entered blocking state [ 2382.292950][T15632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2382.316545][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2382.323936][T25869] bridge0: port 1(bridge_slave_0) entered disabled state [ 2382.331084][T25869] bridge0: port 2(bridge_slave_1) entered disabled state [ 2382.339897][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2382.347918][ T7115] bridge0: port 1(bridge_slave_0) entered blocking state [ 2382.354727][ T7115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2382.363684][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2382.371843][T10765] bridge0: port 2(bridge_slave_1) entered blocking state [ 2382.378683][T10765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2382.391164][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2382.400237][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2382.414171][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2382.426046][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2382.433826][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2382.441543][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2382.450317][T15632] device veth0_vlan entered promiscuous mode [ 2382.461088][T15632] device veth1_macvtap entered promiscuous mode [ 2382.475215][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2382.489543][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2382.497885][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2382.842411][T15655] bridge0: port 1(bridge_slave_0) entered blocking state [ 2382.849336][T15655] bridge0: port 1(bridge_slave_0) entered disabled state [ 2382.888344][T15655] device bridge_slave_0 entered promiscuous mode [ 2382.896694][T15655] bridge0: port 2(bridge_slave_1) entered blocking state [ 2382.903523][T15655] bridge0: port 2(bridge_slave_1) entered disabled state [ 2382.911204][T15655] device bridge_slave_1 entered promiscuous mode [ 2383.057648][T15655] bridge0: port 2(bridge_slave_1) entered blocking state [ 2383.064505][T15655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2383.071633][T15655] bridge0: port 1(bridge_slave_0) entered blocking state [ 2383.078398][T15655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2383.109874][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2383.117726][ T7117] bridge0: port 1(bridge_slave_0) entered disabled state [ 2383.124855][ T7117] bridge0: port 2(bridge_slave_1) entered disabled state [ 2383.136536][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2383.144444][T25869] bridge0: port 1(bridge_slave_0) entered blocking state [ 2383.151231][T25869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2383.158709][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2383.166719][T25869] bridge0: port 2(bridge_slave_1) entered blocking state [ 2383.173534][T25869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2383.192373][T15655] device veth0_vlan entered promiscuous mode [ 2383.199217][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2383.208034][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2383.215767][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2383.222955][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2383.230576][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2383.238458][T10765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2383.255462][T15655] device veth1_macvtap entered promiscuous mode [ 2383.262164][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2383.272756][T25869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2383.284260][ T7117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2383.295337][ T2193] device bridge_slave_1 left promiscuous mode [ 2383.301522][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2383.309125][ T2193] device bridge_slave_0 left promiscuous mode [ 2383.315021][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2383.323206][ T2193] device bridge_slave_1 left promiscuous mode [ 2383.329330][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2383.336653][ T2193] device bridge_slave_0 left promiscuous mode [ 2383.342559][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2383.350339][ T2193] device veth1_macvtap left promiscuous mode [ 2383.356267][ T2193] device veth0_vlan left promiscuous mode [ 2383.361923][ T2193] device veth1_macvtap left promiscuous mode [ 2383.367692][ T2193] device veth0_vlan left promiscuous mode [ 2383.789106][T15683] device syzkaller0 entered promiscuous mode [ 2385.157144][ T2193] device bridge_slave_1 left promiscuous mode [ 2385.163058][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2385.170515][ T2193] device bridge_slave_0 left promiscuous mode [ 2385.176555][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2385.184210][ T2193] device bridge_slave_1 left promiscuous mode [ 2385.190235][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2385.197527][ T2193] device bridge_slave_0 left promiscuous mode [ 2385.203437][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2385.211186][ T2193] device bridge_slave_1 left promiscuous mode [ 2385.217139][ T2193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2385.224281][ T2193] device bridge_slave_0 left promiscuous mode [ 2385.230329][ T2193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2385.238506][ T2193] device veth1_macvtap left promiscuous mode [ 2385.244335][ T2193] device veth0_vlan left promiscuous mode [ 2385.250547][ T2193] device veth1_macvtap left promiscuous mode [ 2385.256391][ T2193] device veth0_vlan left promiscuous mode [ 2385.262012][ T2193] device veth1_macvtap left promiscuous mode [ 2385.267828][ T2193] device veth0_vlan left promiscuous mode [ 2385.655533][T15715] syz.1.44215[15715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2385.655583][T15715] syz.1.44215[15715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2385.696492][T15715] syz.1.44215[15715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2385.708579][T15715] syz.1.44215[15715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2385.733062][T15715] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 2385.785106][T15721] syz.1.44215[15721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! SYZFAIL: failed to mkdir (errno 28: No space left on device) loop exited with status 67 SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: failed to mkdtemp (errno 28: No space left on device) SYZFAIL: repeatedly failed to execute the program proc=3 req=44198 state=1 status=67 (errno 9: Bad file descriptor)